Modeling the propagation of worms in networks: A survey

Y Wang, S Wen, Y Xiang, W Zhou - … Communications Surveys & …, 2013 - ieeexplore.ieee.org
There are the two common means for propagating worms: scanning vulnerable computers in
the network and spreading through topological neighbors. Modeling the propagation of …

Openflow random host mutation: transparent moving target defense using software defined networking

JH Jafarian, E Al-Shaer, Q Duan - Proceedings of the first workshop on …, 2012 - dl.acm.org
Static configurations serve great advantage for adversaries in discovering network targets
and launching attacks. Identifying active IP addresses in a target domain is a precursory step …

Method and system for detecting malicious and/or botnet-related domain names

R Perdisci, W Lee - US Patent 10,027,688, 2018 - Google Patents
A method and system of detecting a malicious and/or botnet-related domain name,
comprising: reviewing a domain name used in Domain Name System (DNS) traffic in a …

Performance modeling of epidemic routing

X Zhang, G Neglia, J Kurose, D Towsley - Computer Networks, 2007 - Elsevier
In this paper, we develop a rigorous, unified framework based on ordinary differential
equations (ODEs) to study epidemic routing and its variations. These ODEs can be derived …

Method and system for detecting and responding to attacking networks

D Dagon, N Feamster, W Lee, R Edmonds… - US Patent …, 2013 - Google Patents
A system and method for detecting a first network of compromised computers in a second
network of computers, comprising: collecting Domain Name System (DNS) data for the …

[PDF][PDF] Modeling Botnet Propagation Using Time Zones.

D Dagon, CC Zou, W Lee - NDSS, 2006 - cs.ucf.edu
Time zones play an important and unexplored role in malware epidemics. To understand
how time and location affect malware spread dynamics, we studied botnets, or large …

An effective address mutation approach for disrupting reconnaissance attacks

JH Jafarian, E Al-Shaer, Q Duan - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Network reconnaissance of addresses and ports is prerequisite to a vast majority of cyber
attacks. Meanwhile, the static address configuration of networks and hosts simplifies …

Random host mutation for moving target defense

E Al-Shaer, Q Duan, JH Jafarian - … Conference on Security and Privacy in …, 2012 - Springer
Exploiting static configuration of networks and hosts has always been a great advantage for
design and launching of decisive attacks. Network reconnaissance of IP addresses and …

The monitoring and early detection of internet worms

CC Zou, W Gong, D Towsley… - IEEE/ACM Transactions …, 2005 - ieeexplore.ieee.org
After many Internet-scale worm incidents in recent years, it is clear that a simple self-
propagating worm can quickly spread across the Internet and cause severe damage to our …

Modeling and simulation study of the propagation and defense of internet e-mail worms

CC Zou, D Towsley, W Gong - IEEE Transactions on …, 2007 - ieeexplore.ieee.org
As many people rely on e-mail communications for business and everyday life, Internet e-
mail worms constitute one of the major security threats for our society. Unlike scanning …