Results 11 - 20
of
1,608
ANALYSIS OF ROUTING WORM INFECTION RATES ON AN IPV4 NETWORK
, 2007
"... Malicious logic, specifically worms cost network users an enormous amount of time and money. Worms, like Slammer and Code Red, infect thousands of systems and denied whole networks access to the Internet. This research examines the ability of the original Slammer worm, a Slammer based routing worm, ..."
Abstract
- Add to MetaCart
Malicious logic, specifically worms cost network users an enormous amount of time and money. Worms, like Slammer and Code Red, infect thousands of systems and denied whole networks access to the Internet. This research examines the ability of the original Slammer worm, a Slammer based routing worm
Internet Quarantine: Requirements for Containing Self-Propagating Code
, 2003
"... It has been clear since 1988 that self-propagating code can quickly spread across a network by exploiting homogeneous security vulnerabilities. However, the last few years have seen a dramatic increase in the frequency and virulence of such "worm" outbreaks. For example, the Code-Red worm ..."
Abstract
-
Cited by 324 (10 self)
- Add to MetaCart
and containing worm infections before they can cause such damage.
Nodular Worm Infection in Wild Chimpanzees in Western Uganda: A Risk for
"... This study focused on Oeosophagostomum sp., and more especially on O. bifurcum, as a parasite that can be lethal to humans and is widespread among humans and monkeys in endemic regions, but has not yet been documented in apes. Its epidemiology and the role played by non-human primates in its transmi ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
-term health monitoring of wild chimpanzees from Kibale National Park in Western Uganda, we analysed 311 samples of faeces. Coproscopy revealed that high-ranking males are more infected than other individuals. These chimpanzees are also the more frequent cropraiders. Results from PCR assays conducted on larvae
Proliferation of Worm Infection in P2P Networks and its Prohibition
"... Abstract: Malicious software or Malware is the software developed with malicious intentions. Hackers use it for spoiling computer programs or to get access to sensitive information. The detection of such malware can be done by writing program which can understand the dynamics of malware. Towards thi ..."
Abstract
- Add to MetaCart
Abstract: Malicious software or Malware is the software developed with malicious intentions. Hackers use it for spoiling computer programs or to get access to sensitive information. The detection of such malware can be done by writing program which can understand the dynamics of malware. Towards this end this paper presents an analytical model which can effectively characterize the true nature of malware and how it spreads in P2P networks such as Gnutella. The proposed model is compartmental model which involves derivation of network conditions and system parameters in such a way that under those parameters and conditions the underlying P2P network reaches a malware free equilibrium. The proposed model can also perform evaluation of strategies such as quarantine used to control malware spread. Afterwards the model has been enhanced and tested with networks of smart cell phones. The empirical results revealed that the proposed model is effective and useful. Index Terms: Malware, peer-to-peer networks, compartmental model, Bit Torrent and Time to Live (TTL).
Effects of Maternal Worm Infections and Anthelminthic Treatment during Pregnancy on Infant Motor and Neurocognitive Functioning
, 2011
"... We tested the hypothesis that maternal worm infections in pregnancy affect infant motor and neurocognitive development, and that anthelminthic treatment during pregnancy can reverse these effects. We used measures which examine infant motor, cognitive and executive function, including inhibition. We ..."
Abstract
- Add to MetaCart
We tested the hypothesis that maternal worm infections in pregnancy affect infant motor and neurocognitive development, and that anthelminthic treatment during pregnancy can reverse these effects. We used measures which examine infant motor, cognitive and executive function, including inhibition
Vigilante: End-to-End Containment of Internet Worm Epidemics
, 2008
"... Worm containment must be automatic because worms can spread too fast for humans to respond. Recent work proposed network-level techniques to automate worm containment; these techniques have limitations because there is no information about the vulnerabilities exploited by worms at the network level. ..."
Abstract
-
Cited by 304 (6 self)
- Add to MetaCart
. We propose Vigilante, a new end-to-end architecture to contain worms automatically that addresses these limitations. In Vigilante, hosts detect worms by instrumenting vulnerable programs to analyze infection attempts. We introduce dynamic data-flow analysis: a broad-coverage host-based algorithm
Polygraph: Automatically generating signatures for polymorphic worms
- In Proceedings of the IEEE Symposium on Security and Privacy
, 2005
"... It is widely believed that content-signature-based intrusion detection systems (IDSes) are easily evaded by polymorphic worms, which vary their payload on every infection attempt. In this paper, we present Polygraph, a signature generation system that successfully produces signatures that match poly ..."
Abstract
-
Cited by 275 (17 self)
- Add to MetaCart
It is widely believed that content-signature-based intrusion detection systems (IDSes) are easily evaded by polymorphic worms, which vary their payload on every infection attempt. In this paper, we present Polygraph, a signature generation system that successfully produces signatures that match
The Journal of Experimental Medicine CORRESPONDENCE
"... protects against gastrointestinal worm infection ..."
Results 11 - 20
of
1,608