Algorithm for Evaluating Worm Threat

Worm propagates through network, and attacks the vulnerability, which exists in much extensively used software, to exhaust the network resource. Since the first worm created in 1988, the security threat posed by worms has steadily increased, especially in the last ten years. The Code Red worm and Nimda worm incidents of 2001 have shown the authors how vulnerable their networks are and how fast a worm can spread. In this paper, an integrated worm ecology model is given to study the propagation of such worms. The analytical results provide insights of the worm design and impact to network.

Provided by: Science and Development Network (SciDev.Net) Topic: Security Date Added: Apr 2013 Format: PDF

Find By Topic