{"title":"安全解决方案对蠕虫传播的影响","authors":"M. R. Faghani, H. Saidi, M. Ataei","doi":"10.1109/ISTEL.2008.4651266","DOIUrl":null,"url":null,"abstract":"Automated propagating malwares such as worms have drawn significant attention due to their adverse impact on Internet and network security. According to latest advisories, malware creation has reached epidemic proportions. While much research attention has been paid in developing stochastic models of worm propagation, the real world prevention mechanisms have not been deployed in simulations. Describing the worm propagation cycle in real world and identifying the ways that worms exploit to spread themselves, this article will step through common practices to prevent worm propagation and also examines these results in the analytical worm propagation model.","PeriodicalId":133602,"journal":{"name":"2008 International Symposium on Telecommunications","volume":"8 4","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Effects of security solutions on worm propagation\",\"authors\":\"M. R. Faghani, H. Saidi, M. Ataei\",\"doi\":\"10.1109/ISTEL.2008.4651266\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Automated propagating malwares such as worms have drawn significant attention due to their adverse impact on Internet and network security. According to latest advisories, malware creation has reached epidemic proportions. While much research attention has been paid in developing stochastic models of worm propagation, the real world prevention mechanisms have not been deployed in simulations. Describing the worm propagation cycle in real world and identifying the ways that worms exploit to spread themselves, this article will step through common practices to prevent worm propagation and also examines these results in the analytical worm propagation model.\",\"PeriodicalId\":133602,\"journal\":{\"name\":\"2008 International Symposium on Telecommunications\",\"volume\":\"8 4\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-10-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 International Symposium on Telecommunications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISTEL.2008.4651266\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 International Symposium on Telecommunications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISTEL.2008.4651266","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Automated propagating malwares such as worms have drawn significant attention due to their adverse impact on Internet and network security. According to latest advisories, malware creation has reached epidemic proportions. While much research attention has been paid in developing stochastic models of worm propagation, the real world prevention mechanisms have not been deployed in simulations. Describing the worm propagation cycle in real world and identifying the ways that worms exploit to spread themselves, this article will step through common practices to prevent worm propagation and also examines these results in the analytical worm propagation model.