2009
DOI: 10.25103/jestr.021.08
|View full text |Cite
|
Sign up to set email alerts
|

Genetic algorithm based Internet worm propagation strategy modeling under pressure of countermeasures

Abstract: Internet worms remain one of the major threats to the Internet infrastructure. Modeling allows forecasting the malware propagation consequences and evolution trends, planning countermeasures and many other tasks that cannot be investigated without harm to production systems in the wild. Existing malware propagation models mainly concentrate on malware epidemic consequences modeling, i.e. forecasting the number of infected computers, simulating malware behavior or economic propagation aspects and are based only… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 5 publications
(3 reference statements)
0
6
0
Order By: Relevance
“…The effect of countermeasures on the evolution of the Intemet worm was discussed in (Goranin, Cenys 2009). A rather similar concept was proposed almost one year later in (Noreen et al 2009).…”
Section: Prior and Related Workmentioning
confidence: 94%
See 1 more Smart Citation
“…The effect of countermeasures on the evolution of the Intemet worm was discussed in (Goranin, Cenys 2009). A rather similar concept was proposed almost one year later in (Noreen et al 2009).…”
Section: Prior and Related Workmentioning
confidence: 94%
“…In (Goranin, Cenys 2008), we have proposed the GA based model dedicated to forecasting the evolution of propagation techniques used by the Intemet worms at the initial propagation phase. The effect of countermeasures on the evolution of the Intemet worm was discussed in (Goranin, Cenys 2009).…”
Section: Prior and Related Workmentioning
confidence: 99%
“…• R. Rainys researches we tied up to computer network infrastructure (Rainys, 2006;Kajackas et al, 2011); • N. Goranin proposed a genetic algorithm based model for estimating the propagation rates of known and perspective Internet worms after their propagation reaches the satiation phase (Goranin et al 2008); • S. Ramanauskaite proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering, and memory depletion models for a more realistic representation of similar cyber attacks (Ramanauskaitė et al 2015); • J. Janulevicius performed analysis of virtualization and risk assessment (Janulevičius et al, 2017); • Several scientists under M.K. Ragulskis leadership performed an indepth analysis of cryptography.…”
Section: Research On Information Security Management In Lithuaniamentioning
confidence: 99%
“…Although it is widely accepted that malware evolution forecasting is an important information security task, the first model-based research paper on this topic appeared only in 2008 [6], which discussed the Internet worm evolution trends. It was shown that GA may be used for malware characteristic evolution forecasting.…”
Section: Introductionmentioning
confidence: 99%