Filters








1,928 Hits in 10.1 sec

Accelerating the Propagation of Active Worms by Employing Multiple Target Discovery Techniques [chapter]

Xiang Fan, Yang Xiang
2008 Lecture Notes in Computer Science  
of target discovery techniques that can best accelerate propagation of active worms discovered from results of the comprehensive simulations.  ...  We studied propagation mechanisms of active worms employing single target discovery technique and various combinations of two or three different target discovery techniques from attackers' perspective.  ...  We summarized the factor(s) improved by active worms employing the various target discovery techniques to accelerate their propagation in [11] .  ... 
doi:10.1007/978-3-540-88140-7_14 fatcat:iemj4zyx2bgmbex42mmc4vgx3m

Defending against the propagation of active worms

Xiang Fan, Yang Xiang
2009 Journal of Supercomputing  
Active worms propagate across networks by employing the various target discovery techniques.  ...  It is anticipated that future active worms would employ multiple target discovery techniques simultaneously to greatly accelerate their propagation.  ...  In particular, Sect. 3 examines the impact of employing multiple target discovery techniques simultaneously on the propagation characteristics of active worms.  ... 
doi:10.1007/s11227-009-0283-8 fatcat:enzbtgou2renzbbkfrlmfdp224

A taxonomy of computer worms

Nicholas Weaver, Vern Paxson, Stuart Staniford, Robert Cunningham
2003 Proceedings of the 2003 ACM workshop on Rapid Malcode - WORM'03  
To understand the threat posed by computer worms, it is necessary to understand the classes of worms, the attackers who may employ them, and the potential payloads.  ...  This paper describes a preliminary taxonomy based on worm target discovery and selection strategies, worm carrier mechanisms, worm activation, possible payloads, and plausible attackers who would employ  ...  Some of the most successful worms are multi-modal, employing multiple means of target discovery, carrier, payload, etc., where the combination enables the worm to surpass defenses (no matter how effective  ... 
doi:10.1145/948187.948190 dblp:conf/worm/WeaverPSC03 fatcat:6s2oo75eqvdqpbfm2zg57p7mzq

A hybrid quarantine defense

Phillip Porras, Linda Briesemeister, Keith Skinner, Karl Levitt, Jeff Rowe, Yu-Cheng Allen Ting
2004 Proceedings of the 2004 ACM workshop on Rapid malcode - WORM '04  
We study the strengths, weaknesses, and potential synergies of two complementary worm quarantine defense strategies under various worm attack profiles.  ...  We compare the performance of the individual strategies against a hybrid combination strategy, and conclude that the hybrid strategy yields substantial performance improvements, beyond what either technique  ...  The objective is to employ each rate limiter to effectively slow the propagation of aggressive worms, allowing Friends message to propagate to groups and activate a defensive posture in time to halt infection  ... 
doi:10.1145/1029618.1029630 dblp:conf/worm/PorrasBSLRT04 fatcat:5vmjsf7hlvcy5n2dxi273sylji

The Effects of Threading, Infection Time, and Multiple-Attacker Collaboration on Malware Propagation

Yu Zhang, Bharat Bhargava, Philipp Hurni
2009 2009 28th IEEE International Symposium on Reliable Distributed Systems  
State-of-the-art malware propagation models fail to consider a number of issues. First, the malware can scan a host for multiple vulnerabilities on multiple ports.  ...  We prove the Linear Property, which shows that the effects of multiple-attacker collaboration can be represented by linear combinations of individual attacks.  ...  A number of models have been proposed to characterize propagation of worms, including the state-of-the-art Analytical Active Worm Propagation (AAWP) model [1] , and the epidemiological two-factor model  ... 
doi:10.1109/srds.2009.17 dblp:conf/srds/ZhangBH09 fatcat:cre66l6ofjdatnnt2if7bbq6mq

Malware characteristics and threats on the internet ecosystem

Zhongqiang Chen, Mema Roussopoulos, Zhanyan Liang, Yuan Zhang, Zhongrong Chen, Alex Delis
2012 Journal of Systems and Software  
We also deploy word stemming and stopword removal techniques to reduce dimensions of the feature space.  ...  Our prototype helps establish that malicious strains improve their penetration rate through multiple propagation channels as well as compact code footprints; moreover, they attempt to evade detection by  ...  This work has been partially supported by the European Commission D4Science II FP7 Project and the ERC Starting Grant Project (no 279237).  ... 
doi:10.1016/j.jss.2012.02.015 fatcat:6dvcm2i7ojf7foe7gcrskwoopa

Modeling the Propagation of Worms in Networks: A Survey

Yini Wang, Sheng Wen, Yang Xiang, Wanlei Zhou
2014 IEEE Communications Surveys and Tutorials  
In recent years, propagation mechanisms used by worms have evolved with the proliferation of data transmission, instant messages and other communication technologies.  ...  However, previous models mainly focus on analyzing the trends of worm propagation and fail to describe the spreading of worms between different individual nodes.  ...  Before a worm can be widely spread, it must first explore the vulnerabilities in the network by employing various target discovery techniques.  ... 
doi:10.1109/surv.2013.100913.00195 fatcat:6nwmunzbg5byhda5job2krhqcq

Internet Epidemics: Attacks, Detection and Defenses, and Trends [chapter]

Zesheng Chen, Chao Che
2011 Intrusion Detection Systems  
To characterize scanning methods, we employ the analytical active worm propagation (AAWP) model and its extensions (6) .  ...  The way that a worm uses to find a target is called the scanning method or the target discovery strategy.  ...  Intrusion Detection Systems The current structure of the chapters reflects the key aspects discussed in the papers but the papers themselves contain more additional interesting information: examples of  ... 
doi:10.5772/13811 fatcat:jwadoo3hdnactfz3o7nyjwmfku

HSP110 dependent HSP70 disaggregation machinery mediates prion-like propagation of amyloidogenic proteins in metazoa [article]

Jessica Tittelmeier, Carl Alexander Sandhof, Heidrun Maja Ries, Silke Druffel-Augustin, Axel Mogk, Bernd Bukau, Carmen Nussbaum-Krammer
2019 bioRxiv   pre-print
The knockdown (KD) of HSP-110 not only impaired HSP70 disaggregation activity and prevented the resolubilization of amorphous heat shock induced firefly luciferase aggregates, but also compromised the  ...  Therefore, the HSP70 disaggregation activity is a double-edged sword as it is essential for the maintenance of cellular proteostasis while being involved in the generation of toxic amyloid-type protein  ...  This study is part of the PROTEST-70 project within the EU Joint Programme -Neurodegenerative Disease Research (JPND) project. This project  ... 
doi:10.1101/795435 fatcat:uxdnd4f5hfemlmvunxmazrn6je

Schistosoma comparative genomics: integrating genome structure, parasite biology and anthelmintic discovery

Martin T. Swain, Denis M. Larkin, Conor R. Caffrey, Stephen J. Davies, Alex Loukas, Patrick J. Skelly, Karl F. Hoffmann
2011 Trends in Parasitology  
our research activities.  ...  Acknowledgments We thank the many individuals within and outside the global worm community who have supported and encouraged us throughout the years.  ...  Integration of 'omics' technologies has accelerated the development of new post-genomic tools to aid vaccine discovery.  ... 
doi:10.1016/j.pt.2011.09.003 pmid:22024648 pmcid:PMC3223292 fatcat:ql2kmkbf5fgmbdo4adyhcp7pj4

Mobile Botnets Development: Issues and Solutions

Paolo Farina, Enrico Cambiaso, Gianluca Papaleo, Maurizio Aiello
2014 International Journal of Future Computer and Communication  
In this paper, we consider the execution of coordinated and distributed attacks perpetrated by mobile devices (mobile botnet).  ...  Then, we identify problems deriving from the development of a mobile botnet.  ...  employed for worms spreading over the Internet.  ... 
doi:10.7763/ijfcc.2014.v3.333 fatcat:avjxqh5erbfjth7tv6beym7scu

PROGRAM DIFFERENTIATION

DANIEL CHANG, STEPHEN HINES, PAUL WEST, GARY TYSON, DAVID WHALLEY
2012 Journal of Circuits, Systems and Computers  
By focusing on prevention of malware propagation in addition to traditional absolute defenses, we target the economics of malware in order to make attacks prohibitively expensive and infeasible.  ...  Computational demands on any instance of the application are minimized, while the resources required to attack multiple systems grows with the number of systems attacked.  ...  This approach means that systems security is always lagging behind the discovery of new vulnerabilities and fast propagation can defeat even the most active malware defense.  ... 
doi:10.1142/s0218126612400075 fatcat:hvck7n25pbhajn4y6ukplmocji

Program differentiation

Daniel Chang, Stephen Hines, Paul West, Gary Tyson, David Whalley
2010 Proceedings of the 2010 Workshop on Interaction between Compilers and Computer Architecture - INTERACT-14  
By focusing on prevention of malware propagation in addition to traditional absolute defenses, we target the economics of malware in order to make attacks prohibitively expensive and infeasible.  ...  Computational demands on any instance of the application are minimized, while the resources required to attack multiple systems grows with the number of systems attacked.  ...  This approach means that systems security is always lagging behind the discovery of new vulnerabilities and fast propagation can defeat even the most active malware defense.  ... 
doi:10.1145/1739025.1739038 fatcat:5ke5i5x2zzcpfi7ic5kn5ircy4

In vitro manipulation of gene expression in larval Schistosoma: a model for postgenomic approaches in Trematoda

TIMOTHY P. YOSHINO, NATHALIE DINGUIRARD, MARINA DE MORAES MOURÃO
2009 Parasitology  
leading to discovery of new drug and vaccine targets, enhanced diagnostics and insights into the complex biology underlying host-parasite interactions.  ...  With rapid developments in DNA and protein sequencing technologies, combined with powerful bioinformatics tools, a continued acceleration of gene identification in parasitic helminths is predicted, potentially  ...  Acknowledgments Selected published and unpublished data cited in this review were supported by NIH grants AI061436 and AI015503 (TPY).  ... 
doi:10.1017/s0031182009991302 pmid:19961646 pmcid:PMC3682473 fatcat:kqtna2op2jbxbfjktu7bgq2vue

On JavaScript Malware and related threats

Martin Johns
2007 Journal in Computer Virology  
This paper documents the state of the art concerning this class of attacks, sums up relevant protection approaches, and provides directions for future research.  ...  Such attacks can either invade the user's privacy, explore and exploit the LAN, or use the victimized browser as an attack proxy.  ...  Assisting worm propagation Lam et al. [51] discussed how web browsers can be abused to aid the propagation of worms that spread through vulnerabilities in web applications.  ... 
doi:10.1007/s11416-007-0076-7 fatcat:24teelap3rfh7fz52altjaymca
« Previous Showing results 1 — 15 out of 1,928 results