作者: Y. Wang , S. Wen , S. Cesare , W. Zhou , Y. Xiang
关键词: Computer security 、 Software 、 Distributed computing 、 Security industry 、 Software deployment 、 Computer science 、 Complex matrix 、 Network security 、 Component (UML) 、 Process (computing) 、 General Computer Science
摘要: Each year, large amounts of money and labor are spent on patching the vulnerabilities in operating systems various popular software to prevent exploitation by worms. Modeling propagation process can help us devise effective strategies against those worms’ spreading. This paper presents a microcosmic analysis worm procedures. Our proposed model is different from traditional methods examines deep inside procedure among nodes network concentrating probability time delay described complex matrix. Moreover, since gives insight into worm's propagation, avoid errors that usually concealed macroscopic analytical models. The objectives this address three practical aspects preventing propagation: (i) where do we patch? (ii) how many need (iii) when We implement series experiments evaluate effects each major component our model. Based results drawn experiments, for high-risk vulnerabilities, it critical networks reduce number vulnerable below 80%. believe benefit security industry allowing them save significant deployment their schemes.