20th Annual Computer Security Applications Conference 2004
DOI: 10.1109/csac.2004.47
|View full text |Cite
|
Sign up to set email alerts
|

Using predators to combat worms and viruses: a simulation-based study

Abstract: Large-scale attacks generated by fast-spreading or stealthy malicious mobile code, such as flash worms and e-mail viruses, demand new approaches to patch management and disinfection. Currently popular centralized approaches suffer from distribution bottlenecks which cannot be solved by merely increasing the number of servers, as the number of servers required to eliminate all bottlenecks is impractically large. Recently, predators were proposed as a technique for eliminating automated mobile malware from compu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2008
2008
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(14 citation statements)
references
References 18 publications
0
14
0
Order By: Relevance
“…To model the spread of malware we will make use of similar paradigms of Lotka-Volterra equations [2] but design it a little differently to reflect the nature of malware proliferation. Specifically, simply using our knowledge of how malware can spread by exploiting certain set of known and unknown vulnerabilities to design equations that allow us to model and analyze the dynamics of its proliferation [3] [5].…”
Section: Onto Malwarementioning
confidence: 99%
See 3 more Smart Citations
“…To model the spread of malware we will make use of similar paradigms of Lotka-Volterra equations [2] but design it a little differently to reflect the nature of malware proliferation. Specifically, simply using our knowledge of how malware can spread by exploiting certain set of known and unknown vulnerabilities to design equations that allow us to model and analyze the dynamics of its proliferation [3] [5].…”
Section: Onto Malwarementioning
confidence: 99%
“…Using the Lotka-Volterra equations from biomathematics [2] to depict the malware [8][9] propagation model:…”
Section: Analysis Of Malware Propagation Model Parametersmentioning
confidence: 99%
See 2 more Smart Citations
“…• Predator worms are revisited periodically, the somewhat romantic notion that good worms can hunt down and destroy bad worms, or that good worms can find and patch vulnerable machines [1, 10,30]. Real attempts at predator worms, such as the Welchia worm which tried to clean up after Blaster [24], have generally proven disastrous and have resulted in more trouble than the original worm caused.…”
Section: Benevolent Viruses and Wormsmentioning
confidence: 99%