Defensive computer worms: an overview

作者: Ziyad S. Al Salloum

DOI: 10.1504/IJSN.2012.048479

关键词:

摘要: Worms have always been mentioned within the context of malware; indeed, media has referred to these self-replicating and self-propagating network programs as malicious. But there is another side worms, in which its distinctive features can be utilised protect - rather than damage enterprise networks. In this paper, we discuss very controversial topic shed some light on history, philosophy, features, definitions, design guidelines, distinguish between malicious defensive worms an attempt break common negative conception usually held towards computer worms.

参考文章(36)
Thomas Ptacek, Jose Nazario, Dug Song, Wormability: A Description for Vulnerabilities ,(2004)
David Ferbrache, A pathology of computer viruses ,(1991)
David M. Nicol, Michael Liljenstam, Models of Active Worm Defenses Coordinated Science Laboratory, University of Illinois at Urbana-Champaign. ,(2004)
Ed Skoudis, Lenny Zeltser, Malware: Fighting Malicious Code ,(2003)
Xiaofeng Nie, Jiwu Jing, Yuewu Wang, A novel contagion-like patch dissemination mechanism against peer-to-peer file-sharing worms international conference on information security and cryptology. pp. 313- 323 ,(2009) , 10.1007/978-3-642-16342-5_23
A. Gupta, D.C. DuVarney, Using predators to combat worms and viruses: a simulation-based study annual computer security applications conference. pp. 116- 125 ,(2004) , 10.1109/CSAC.2004.47
Dan Wu, Dongyang Long, Changji Wang, Zhanpeng Guan, Modeling and Analysis of Worm and Killer-Worm Propagation Using the Divide-and-Conquer Strategy Distributed and Parallel Computing. pp. 370- 375 ,(2005) , 10.1007/11564621_43
Cliff Changchun Zou, Weibo Gong, Don Towsley, Code red worm propagation modeling and analysis Proceedings of the 9th ACM conference on Computer and communications security - CCS '02. pp. 138- 147 ,(2002) , 10.1145/586110.586130