Filters








3,637 Hits in 5.8 sec

On the Effectiveness of Internal Patching Against File-Sharing Worms [chapter]

Liang Xie, Hui Song, Suncun Zhu
<i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/guxi6yr7jvgi5ciszv2spllj3u" style="color: black;">Applied Cryptography and Network Security</a> </i> &nbsp;
File-sharing worms have been terrorizing Peer-to-peer (P2P) systems  ...  Acknowledgements This research was supported in part by the National Science Foundation CAREER-0643906. We thank the anonymous reviewers for their helpful comments.  ...  We studied the case when a file-sharing worm Benjamin.a [4] surges in the network and evaluated the effectiveness of our countermeasures.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-68914-0_1">doi:10.1007/978-3-540-68914-0_1</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/acns/XieSZ08.html">dblp:conf/acns/XieSZ08</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/xobb7kmxzbh5fhi4lhksywinzi">fatcat:xobb7kmxzbh5fhi4lhksywinzi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809044105/http://www.cse.psu.edu/~sxz16/papers/acns-worm.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/41/eb/41eba46fa54a8daa66053656850fdb2a97d39fb4.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-68914-0_1"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Review of Computer Malware: Detection and Preventive Strategies

Olusola K. Akinde, Abolaji O. Ilori, Abimbola O. Afolayan, Oludamilare B. Adewuyi
<span title="2022-01-14">2022</span> <i title="Zenodo"> Zenodo </i> &nbsp;
Malware infestations and inhibition before year 2000 centered on system attack, denial of service, and so on.  ...  Shared ignorance about the nature of malware's development and propagation has resulted in colossal loss for both individuals and corporate organizations.  ...  Patching is one of the most effective strategies for diminishing the risk of malware attacks, and many malware attacks have been successful because systems were not patched in a timely manner.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.5847957">doi:10.5281/zenodo.5847957</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/xp6ttibq4veu7haf6scmhrs3zy">fatcat:xp6ttibq4veu7haf6scmhrs3zy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220425212530/https://zenodo.org/record/5847958/files/07%20Paper%2001112115%20IJCSIS%20Camera%20Ready%20pp49-55.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7a/90/7a90d29d45c17d68f809d3325884bea0b85ef067.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.5847957"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> zenodo.org </button> </a>

Phagocytes: A Holistic Defense and Protection Against Active P2P Worms [article]

Ruichuan Chen, Eng Keong Lua, Jon Crowcroft, Liyong Tang, Zhong Chen
<span title="2011-08-05">2011</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
The evaluation results illustrate that our Phagocytes are capable of achieving a total defense against active P2P worms.  ...  The Phagocytes further provide the access control and filtering mechanisms for communication establishment between the internal P2P overlay and the external hosts.  ...  as well as a connected dominating set based scheme to achieve fast patch distribution in a race with the worm, and in [28] , Xie et al. further designed a P2P patching system through file-sharing mechanisms  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1108.1350v1">arXiv:1108.1350v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/wlx3l5nvzna6bae6fu3n4zkbge">fatcat:wlx3l5nvzna6bae6fu3n4zkbge</a> </span>
<a target="_blank" rel="noopener" href="https://archive.org/download/arxiv-1108.1350/1108.1350.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> File Archive [PDF] </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1108.1350v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Passive Worm and Malware Detection in Peer-to-Peer Networks

Sahar Fahimian, Amirvala Movahed, Mehdi Kharrazi
<span title="">2010</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/xach332uufdvtkfkb2r7ofzzwe" style="color: black;">2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing</a> </i> &nbsp;
In this paper, we investigate a new approach for detecting passive worms and malware in P2P networks based on the popularity of files in the network.  ...  There are many different type of worms in the wild, mostly categorized based on how they find and infect their new victims (i.e. active, passive, etc.).  ...  ACKNOWLEDGMENT The authors would like to thank Ali Ashrafi for assisting with the experimental setup, and Ali Fahimian for helpful discussions.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/euc.2010.133">doi:10.1109/euc.2010.133</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/euc/FahimianMK10.html">dblp:conf/euc/FahimianMK10</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/qjrikor2j5eknlw4e3slmpvyf4">fatcat:qjrikor2j5eknlw4e3slmpvyf4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170610203729/http://sharif.edu:80/~kharrazi/pubs/trustcom10.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1b/31/1b31a8741a1f09ad9bfded8779adecba1651a23b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/euc.2010.133"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Effects of security solutions on worm propagation

Mohammad R. Faghani, Hossein Saidi, Mohammad R. Ataei
<span title="">2008</span> <i title="IEEE"> 2008 International Symposium on Telecommunications </i> &nbsp;
While much research attention has been paid in developing stochastic models of worm propagation, the real world prevention mechanisms have not been deployed in simulations.  ...  Automated propagating malwares such as worms have drawn significant attention due to their adverse impact on Internet and network security.  ...  via online profiles or on the local machine. 3-Through file sharing systems.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/istel.2008.4651266">doi:10.1109/istel.2008.4651266</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/doul4viufngrnczrkzv7fedw2y">fatcat:doul4viufngrnczrkzv7fedw2y</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809134822/http://www.faghani.info/IST08.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/58/cc/58cc545cd432d22e2a020444cc8b0e9287dc7db3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/istel.2008.4651266"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

A Feasibility Study on Defending Against Ultra-Fast TopologicalWorms

Liang Xie, Sencun Zhu
<span title="">2007</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ob4nyu5my5hp5hj6r33huq53xu" style="color: black;">Seventh IEEE International Conference on Peer-to-Peer Computing (P2P 2007)</a> </i> &nbsp;
a group of dominating nodes in the overlay to achieve fast patch dissemination in a race with the worm.  ...  We study the feasibility of leveraging the existing P2P overlay structure for distributing automated security patches to vulnerable machines.  ...  On the other hand, these servers do not participate in the file-sharing process, hence they do not have to be very powerful. We adopt two defense principles.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/p2p.2007.31">doi:10.1109/p2p.2007.31</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/p2p/HuMSHY07.html">dblp:conf/p2p/HuMSHY07</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ckm5swangncn5mjwoysznbijbe">fatcat:ckm5swangncn5mjwoysznbijbe</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20091128091946/http://www.cse.psu.edu:80/~szhu/papers/p2pworm.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c5/9f/c59f1607f9906cdd91058b5a623fcf219d7b430e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/p2p.2007.31"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

A Feasibility Study on Defending Against Ultra-Fast TopologicalWorms

Liang Xie, Sencun Zhu
<span title="">2007</span> <i title="IEEE"> Seventh IEEE International Conference on Peer-to-Peer Computing (P2P 2007) </i> &nbsp;
a group of dominating nodes in the overlay to achieve fast patch dissemination in a race with the worm.  ...  We study the feasibility of leveraging the existing P2P overlay structure for distributing automated security patches to vulnerable machines.  ...  On the other hand, these servers do not participate in the file-sharing process, hence they do not have to be very powerful. We adopt two defense principles.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/p2p.2007.4343465">doi:10.1109/p2p.2007.4343465</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/g2qztgle5zh7rbsier2lz2c7bq">fatcat:g2qztgle5zh7rbsier2lz2c7bq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20091128091946/http://www.cse.psu.edu:80/~szhu/papers/p2pworm.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c5/9f/c59f1607f9906cdd91058b5a623fcf219d7b430e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/p2p.2007.4343465"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

The Evolution of Viruses and Worms [chapter]

Jean-Marc Robert, Thomas Chen
<span title="2004-12-28">2004</span> <i title="CRC Press"> Statistics: A Series of Textbooks and Monographs </i> &nbsp;
Computer viruses and network worms have evolved through a continuous series of innovations, leading to the recent wave of fast-spreading and dangerous worms.  ...  First, while viruses were more common than worms initially, worms have become the predominant threat in recent years, coinciding with the growth of computer networking.  ...  The worm also infected various types of files (e.g., VBS, JPG, MP3, etc.) on local drives and networked shared directories.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1201/9781420030884.ch16">doi:10.1201/9781420030884.ch16</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3rztp6qlvfekjmy6fyvppzcpt4">fatcat:3rztp6qlvfekjmy6fyvppzcpt4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20080221185745/http://engr.smu.edu/~tchen/papers/statmethods2004.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b5/2b/b52be659b50095decaf51a2cf93808991d147089.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1201/9781420030884.ch16"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

The internet worm incident [chapter]

Eugene H. Spafford
<span title="">1989</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Consistent with that recommendation, Robert has been suspended from the University for a minimum of one year; the faculty of the computer science department there will have to approve readmission should  ...  Acknowledgements Early versions of this paper were carefully read and commented on by Keith Bostic, Steve Bellovin, Kathleen Heaphy, and Thomas Narten.  ...  Next, the Worm read /etc/passwd (the account and password file) into an internal data structure.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-51635-2_54">doi:10.1007/3-540-51635-2_54</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/r4nhtfpl3jaa7o5xcz6v774y3q">fatcat:r4nhtfpl3jaa7o5xcz6v774y3q</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20061216163031/http://www.csdl.tamu.edu:80/~furuta/courses/99a_410/IWorm/IWorm2.PDF" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f0/ce/f0ce46fc05e1afac0747e64362bde532303bfad3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-51635-2_54"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Simulating non-scanning worms on peer-to-peer networks

Guanling Chen, Robert S. Gray
<span title="">2006</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ulydn26jlrc3hndxine2tszkoa" style="color: black;">Proceedings of the 1st international conference on Scalable information systems - InfoScale &#39;06</a> </i> &nbsp;
Millions of Internet users are using large-scale peerto-peer (P2P) networks to share content files today.  ...  The non-scanning nature allows P2P worms to evade many of today's detection methods aimed at random-scanning worms.  ...  Acknowledgment We thank Institute of Security Technology Studies at Dartmouth College for hosting the fellowship of the first author when working on this project.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1146847.1146876">doi:10.1145/1146847.1146876</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/infoscale/ChenG06.html">dblp:conf/infoscale/ChenG06</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/lcspvqwe6fcuhcaqvjcadvji44">fatcat:lcspvqwe6fcuhcaqvjcadvji44</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20070207021820/http://www.cs.uml.edu:80/~glchen/papers/p2pworm-infoscale06.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d1/e2/d1e21b9605eee5577ad25cb004b6d9a12aca4f2f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1146847.1146876"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Execution transactions for defending against software failures: use and evaluation

Stelios Sidiroglou, Angelos D. Keromytis
<span title="2006-03-08">2006</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/pmp3fe6mtncjnmxpkeavdxh6sm" style="color: black;">International Journal of Information Security</a> </i> &nbsp;
Our scheme provides low impact on application performance, the ability to respond to attacks without human intervention, the capacity to handle previously unknown vulnerabilities, and the preservation  ...  We examine the problem of containing buffer overflow attacks in a safe and efficient manner.  ...  To accomplish this, they rely on ptrace (2) , the /proc file system, and/or special shared libraries.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s10207-006-0083-6">doi:10.1007/s10207-006-0083-6</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/6wtsvxahznbill35gog3pjm4lm">fatcat:6wtsvxahznbill35gog3pjm4lm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20060924235630/http://www1.cs.columbia.edu/~angelos/Papers/2006/trans.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a6/ce/a6ce930b2b75a85e0384f63148d6e0166c5e686d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s10207-006-0083-6"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

A hybrid quarantine defense

Phillip Porras, Linda Briesemeister, Keith Skinner, Karl Levitt, Jeff Rowe, Yu-Cheng Allen Ting
<span title="">2004</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/qqwkzefytnbxfeksmz7tvh4cmu" style="color: black;">Proceedings of the 2004 ACM workshop on Rapid malcode - WORM &#39;04</a> </i> &nbsp;
We study the strengths, weaknesses, and potential synergies of two complementary worm quarantine defense strategies under various worm attack profiles.  ...  We compare the performance of the individual strategies against a hybrid combination strategy, and conclude that the hybrid strategy yields substantial performance improvements, beyond what either technique  ...  Alternatively, the worm may seek out infection targets that share a more local network service, such as a vulnerable file-system sharing service.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1029618.1029630">doi:10.1145/1029618.1029630</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/worm/PorrasBSLRT04.html">dblp:conf/worm/PorrasBSLRT04</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5vmjsf7hlvcy5n2dxi273sylji">fatcat:5vmjsf7hlvcy5n2dxi273sylji</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809104453/http://www.deter-project.org/sites/default/files/photos/porras-hybrid-paper.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b6/8e/b68e67cf9cc7747ec30ddea61a093d4043e70254.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1029618.1029630"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

A new worm propagation threat in BitTorrent: Modeling and analysis

Sinan Hatahet, Abdelmadjid Bouabdallah, Yacine Challal
<span title="">2008</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/lrzkrgmduve7lbp4vxiec45mba" style="color: black;">International Multiconference on Computer Science and Information Technology</a> </i> &nbsp;
One of the constant threats on P2P networks is the propagation of active worms. Recent events show that active worms can spread automatically and flood the Internet in a very short period of time.  ...  Unfortunately, BitTorrent is particularly vulnerable to topology aware active worms. In this paper we analyze the impact of a new worm propagation threat on BitTorrent .  ...  The possible devastating effects on the Internet operation are hard to underestimate.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/imcsit.2008.4747333">doi:10.1109/imcsit.2008.4747333</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/imcsit/HatahetBC08.html">dblp:conf/imcsit/HatahetBC08</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/gf6h4whtarb7nfcj5oufnbqbge">fatcat:gf6h4whtarb7nfcj5oufnbqbge</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20120309075608/http://www.proceedings2008.imcsit.org/pliks/101.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/24/06/24066d91350c157ebe3cd7df4efa7acbb457f929.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/imcsit.2008.4747333"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Mechanisms Of Internet Security Attacks

J. Dubois, P. Jreije
<span title="2008-08-21">2008</span> <i title="Zenodo"> Zenodo </i> &nbsp;
Internet security attack could endanger the privacy of World Wide Web users and the integrity of their data.  ...  The attack can be carried out on today's most secure systems- browsers, including Netscape Navigator and Microsoft Internet Explorer.  ...  The payload of a virus can range from 'comical' pranks to destruction of the system itself. A virus relies on users to spread by sharing infected files either directly or via email.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.1327923">doi:10.5281/zenodo.1327923</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/dslh65n5hzbebkttko5tahf5wm">fatcat:dslh65n5hzbebkttko5tahf5wm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201224022703/https://zenodo.org/record/1327923/files/221.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/fe/81/fe811523af78b3c81d96259401d528d1831d9183.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.1327923"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> zenodo.org </button> </a>

The internet worm program: an analysis

Eugene H. Spafford
<span title="1989-01-03">1989</span> <i title="Association for Computing Machinery (ACM)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/g4bof3rzarbpjigq5zxjkozv2u" style="color: black;">Computer communication review</a> </i> &nbsp;
On the evening of 2 November 1988, someone infected the Internet with a worm program . That program exploited flaws in utility programs in system s based on BSD-derived versions of UMx .  ...  Thi s included a preliminary patch to the sendmail mail agent, and the suggestion to rename one o r both of the C compiler and loader to prevent their use .  ...  Acknowledgment s Much of this analysis was performed on reverse-engineered versions of the worm code . My thanks to all these individuals .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/66093.66095">doi:10.1145/66093.66095</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vzgu2lfqubc4poxf3d7h4qhjb4">fatcat:vzgu2lfqubc4poxf3d7h4qhjb4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809134636/http://vxheaven.org/lib/pdf/The%20Internet%20Worm%20Program%20:%20An%20Analysis.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c2/02/c2029e2802f5987cdbd40475bab3d7456c0170bb.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/66093.66095"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 3,637 results