نتایج جستجو برای: worm

تعداد نتایج: 9462  

Hesamedin Banihashemi, Abdolreza Salahi-Moghadam, Iraj moayedi,

Correspondence: Hesamedin Banihashemi, MD. Faculty of Medicine, Hormozgan University of Medical Sciences. Bandar Abbas, Iran Tel:+98 76 33333687 Email: [email protected] ABSTRACT Introduction: Dirofilaria...

2005
Lunquan Li Soranun Jiwasurat Peng Liu George Kesidis

Worms are a serious threat to Internet security. The past research on worm has been focused on mathematical modeling, numerical analysis, and simulation in addition to proposed defense strategies. We believe a fine-grained, packet-level emulation of worm propagation in enterprise networks is highly beneficial for the deep understanding of worm dynamics and a prerequisite for worm containment an...

2011
Xufei Zheng Tao Li Hua Yang Xin Xiao

Due to the proactive defend against the worm propagation and patch the susceptible hosts, benign worms are attracting wide attentions in the field of worm research. In this paper, we point out the errors of worm-anti-worm model (WAW) and present a revised model named Re-WAW based on the law of worm propagation and Two-Factor model. Based on the discussion of the worm propagation factors such as...

Farhood Yeganehpoor Farideh Samadiyan Mahmud Khoramivafa Vahid Beyginiya,

The experiment was carried out in a factorial arrangement with the base of randomized complete block design in three repetitions. The first factor consisted of 11 bed for eating worm and the second factor is the different seasons (spring and autumn) respectively. Traits was including number of capsules (Coconut), the number of adult worms, the number of immature worms, live worms masses (mg), m...

2007
Bo CHEN Xiao-Chun YUN

After many Internet-scale worm incidents in recent years, it is clear that a simple self-propagation worm can quickly spread across the Internet. And every worm incidents can cause severe damage to our society. So it is necessary to build a system that can detect the presence of worm as quickly as possible. This paper first analyzes the worm’s framework and its propagation model. Then, we descr...

Journal: :Simulation 2006
Cliff Changchun Zou Donald F. Towsley Weibo Gong Songlin Cai

Most well-known worms, such as Code Red, Slammer, Blaster, and Sasser, infected vulnerable computers by scanning the entire IPv4 address space. In this article, the authors present an advanced worm called the “routing worm,” which implements two new attacking techniques. First, a routing worm uses Border Gateway Protocol (BGP) routing tables to only scan the Internet-routable address space, whi...

2005
Jangwon Choi Jaewook Lee Jahwan Koo Byungyeon Park Wonhyuk Lee Seongjin Ahn

The effort required for detecting worm viruses, that threaten the reliability and stability of network resources, is in the process of advancing, demanding increasingly sophisticated resources. Pattern-based worm virus detection systems use detection methods, which focus on pattern analysis for specific worm viruses. In the event of a different attack method, or a new attack occurs, current sys...

2006
Sapon Tanachaiwiwat Ahmed Helmy

“War of the worms” is a war between opposing computer worms, creating complex worm interactions. For example, in September 2003 the Welchia worms were launched to terminate the Blaster worms and patch the vulnerable hosts. In this paper, we try to answer the following questions: How can we explain the dynamic of such phenomena with a simple mathematical model? How can one worm win this war? How...

Journal: :Computers 2015
Jun-Won Ho

In the internet, a worm is usually propagated in a random multi-hop contact manner. However, the attacker will not likely select this random multi-hop propagation approach in a mobile sensor network. This is because multi-hop worm route paths to random vulnerable targets can be often breached due to node mobility, leading to failure of fast worm spread under this strategy. Therefore, an appropr...

Journal: :IEICE Transactions 2009
Yong Tang Jiaqing Luo Bin Xiao Guiyi Wei

Worms are a common phenomenon in today’s Internet and cause tens of billions of dollars in damages to businesses around the world each year. This article first presents various concepts related to worms, and then classifies the existing worms into four types– Internet worms, P2P worms, email worms and IM (Instant Messaging) worms, based on the space in which a worm finds a victim target. The In...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید