Analysis of internet malware propagation models and mitigation strategies
The Internet application has been so popular in the recent times and the concepts of network worms are now the biggest threats to the network security researchers. The trend at which network structure variables and its related applications such as p2p network has given the malware on the internet an...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Published: |
IRACST Press
2012
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/31671/ https://www.iracst.org/ijcnwc/papers/vol2no12012/3vol2no1.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | The Internet application has been so popular in the recent times and the concepts of network worms are now the biggest threats to the network security researchers. The trend at which network structure variables and its related applications such as p2p network has given the malware on the internet an avenue to explore as rapidly as possible and to find ways from which they can propagate. Hence, the need for an accurate mathematical worm propagation model is of paramount desire for the internet. In this paper a conceptualized analysis of the worm propagation models are discussed for the different prevailing environments. The paper tries to highlight the pros and cons of the models and compares them for possible control strategies that could be achieved. It is the desire that others in the research community requiring to learn more on the speed and the dynamics of the changing worm literature can find it interesting to look at. |
---|