Security countermeasures of a SCIRAS model for advanced malware propagation

JDH Guillen, AM Del Rey, R Casado-Vara - IEEE Access, 2019 - ieeexplore.ieee.org
In the new and sophisticated cyber attacks (mainly, advanced persistent threats) the
advanced specimens of malware such that zero-day malware play a crucial role. Due to its …

Attack mitigation using learning machines

JP Vasseur, JC Mota, A Di Pietro, JW Hui - US Patent 9,398,035, 2016 - Google Patents
In one embodiment, techniques are shown and described relating to attack mitigation using
learning machines. A node may receive network traffic data for a computer network, and …

FPM: Four-factors Propagation Model for passive P2P worms

T Chen, X Zhang, Y Wu - Future Generation Computer Systems, 2014 - Elsevier
At present, P2P worm poses a serious threat to the Internet infrastructure and common users
since it spreads extremely fast and is hard to be detected in early stage. In this paper, we …

[PDF][PDF] A novel computer virus model and its stability

M Peng, H Mou - Journal of Networks, 2014 - Citeseer
Computer virus is a malicious code which can causes great damage. A SEIR model is
proposed which considered that the newly entered computer in the network has been …

Fast quarantining of proactive worms in unstructured P2P networks

T Chen, X Zhang, H Li, Y Wu - Journal of Network and Computer …, 2011 - Elsevier
P2P worms pose a serious threat to Internet infrastructure and terminal users because of
their overwhelming propagation speed. Manual reactions fall behind the fast propagation of …

Propagation modeling of active P2P worms based on ternary matrix

T Chen, X Zhang, H Li, D Wang, Y Wu - Journal of network and computer …, 2013 - Elsevier
Propagation modeling of worms has become an attractive research field in recent years
since it facilitates worm prediction, detection, analysis and prevention etc. In this work, we …

Modeling the propagation of topology-aware P2P worms considering temporal parameters

E Mojahedi, MA Azgomi - Peer-to-Peer Networking and Applications, 2015 - Springer
The propagation of topology-aware peer-to-peer (P2P) worms in the Internet is a serious
threat due to their ability to evade traditional detection mechanisms by means of avoiding …

Quarantine-based mitigation of effects of a local DoS attack

JC Mota, JP Vasseur, A Di Pietro, JW Hui - US Patent 9,286,473, 2016 - Google Patents
7,137,145 B2 11/2006 Gleichauf 7,483,972 B2 1/2009 Bhattacharya et al. 7,526,806 B2
4/2009 Wiley et al. 7,607,041 B2 10/2009 Kraemer et al. 7,653,941 B2 1/2010 Gleichauf …

[PDF][PDF] P2P 触发式主动型蠕虫传播建模

冯朝胜, 秦志光, 罗王平, 刘霞, 袁丁 - 电子学报, 2016 - ejournal.org.cn
对P2P 触发式主动型蠕虫的攻击机制进行了研究, 发现该类蠕虫传播通常包括四个阶段:
信息收集, 攻击渗透, 自我推进与干预激活. 基于对P2P 触发式主动型蠕虫攻击机制的分析并运用 …

[引用][C] 基于开放环境的P2P 网络主动型蠕虫传播模型

马雯, 郭平, 张正豪 - 后勤工程学院学报, 2014