Thwarting Network Stealth Worms in Computer Networks through Biological Epidemiology

نویسندگان

  • Kristopher Joseph Hall
  • Jung-Min Park
  • Kristopher J. Hall
چکیده

ii Dedication iii Acknowledgments iv List of Figures ix List of Tables x

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Survey of Anomaly Detection Approaches in Internet of Things

Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. In this ...

متن کامل

Comparison of Artificial Neural Networks and Cox Regression Models in Prediction of Kidney Transplant Survival

Cox regression model serves as a statistical method for analyzing the survival data, which requires some options such as hazard proportionality. In recent decades, artificial neural network model has been increasingly applied to predict survival data. This research was conducted to compare Cox regression and artificial neural network models in prediction of kidney transplant survival. The prese...

متن کامل

Comparison of Artificial Neural Networks and Cox Regression Models in Prediction of Kidney Transplant Survival

Cox regression model serves as a statistical method for analyzing the survival data, which requires some options such as hazard proportionality. In recent decades, artificial neural network model has been increasingly applied to predict survival data. This research was conducted to compare Cox regression and artificial neural network models in prediction of kidney transplant survival. The prese...

متن کامل

Epidemic Spreading in Technological Networks

computer security, viruses, worms, infection models, scale-free networks, small world networks, epidemiology, BICAS Recent computer worms pose a major threat to large computer networks, and it is a general belief that understanding their means of propagation will help to devise efficient control strategies. This dissertation proposes a new epidemiological model to account for particular charact...

متن کامل

In Search of a More Insidious Worm

The Internet has been the victim of numerous worms in the last few years. All such worms have a common underlying principle: launch a blitzkrieg-like attack with wide fan-out. These worms’ operations constituted large denial-ofservice attacks, which disrupted the normal operation of the Internet and made many resources inaccessible. These worms are examples of a historical tendency to write wor...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006