Modeling the propagation of worms in networks: A survey

Y Wang, S Wen, Y Xiang, W Zhou - … Communications Surveys & …, 2013 - ieeexplore.ieee.org
There are the two common means for propagating worms: scanning vulnerable computers in
the network and spreading through topological neighbors. Modeling the propagation of …

A survey of internet worm detection and containment

P Li, M Salour, X Su - IEEE Communications Surveys & …, 2008 - ieeexplore.ieee.org
Self-duplicating, self-propagating malicious codes known as computer worms spread
themselves without any human interaction and launch the most destructive attacks against …

Method and system for detecting malicious and/or botnet-related domain names

R Perdisci, W Lee - US Patent 10,027,688, 2018 - Google Patents
A method and system of detecting a malicious and/or botnet-related domain name,
comprising: reviewing a domain name used in Domain Name System (DNS) traffic in a …

Method and system for detecting and responding to attacking networks

D Dagon, N Feamster, W Lee, R Edmonds… - US Patent …, 2013 - Google Patents
A system and method for detecting a first network of compromised computers in a second
network of computers, comprising: collecting Domain Name System (DNS) data for the …

[PDF][PDF] Modeling Botnet Propagation Using Time Zones.

D Dagon, CC Zou, W Lee - NDSS, 2006 - cs.ucf.edu
Time zones play an important and unexplored role in malware epidemics. To understand
how time and location affect malware spread dynamics, we studied botnets, or large …

A taxonomy of botnet structures

D Dagon, G Gu, CP Lee, W Lee - Twenty-Third Annual …, 2007 - ieeexplore.ieee.org
We propose a taxonomy of botnet structures, based on their utility to the botmaster. We
propose key metrics to measure their utility for various activities (eg, spam, ddos). Using …

Random host mutation for moving target defense

E Al-Shaer, Q Duan, JH Jafarian - … Conference on Security and Privacy in …, 2012 - Springer
Exploiting static configuration of networks and hosts has always been a great advantage for
design and launching of decisive attacks. Network reconnaissance of IP addresses and …

The monitoring and early detection of internet worms

CC Zou, W Gong, D Towsley… - IEEE/ACM Transactions …, 2005 - ieeexplore.ieee.org
After many Internet-scale worm incidents in recent years, it is clear that a simple self-
propagating worm can quickly spread across the Internet and cause severe damage to our …

On the performance of Internet worm scanning strategies

CC Zou, D Towsley, W Gong - Performance evaluation, 2006 - Elsevier
In recent years, fast spreading worms, such as Code Red, Slammer, Blaster and Sasser,
have become one of the major threats to the security of the Internet. In order to defend …

Spatio-temporal address mutation for proactive cyber agility against sophisticated attackers

JHH Jafarian, E Al-Shaer, Q Duan - … of the First ACM Workshop on …, 2014 - dl.acm.org
The static one-to-one binding of hosts to IP addresses allows adversaries to conduct
thorough reconnaissance in order to discover and enumerate network assets. Specifically …