Analysis of internet malware propagation models and mitigation strategies
The Internet application has been so popular in the recent times and the concepts of network worms are now the biggest threats to the network security researchers. The trend at which network structure variables and its related applications such as p2p network has given the malware on the internet an...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Published: |
IRACST Press
2012
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/31671/ https://www.iracst.org/ijcnwc/papers/vol2no12012/3vol2no1.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.utm.31671 |
---|---|
record_format |
eprints |
spelling |
my.utm.316712019-03-25T08:18:22Z http://eprints.utm.my/id/eprint/31671/ Analysis of internet malware propagation models and mitigation strategies Mohammed, Aliyu Mohd. Nor, Sulaiman Marsono, Muhammad Nadzir TK Electrical engineering. Electronics Nuclear engineering The Internet application has been so popular in the recent times and the concepts of network worms are now the biggest threats to the network security researchers. The trend at which network structure variables and its related applications such as p2p network has given the malware on the internet an avenue to explore as rapidly as possible and to find ways from which they can propagate. Hence, the need for an accurate mathematical worm propagation model is of paramount desire for the internet. In this paper a conceptualized analysis of the worm propagation models are discussed for the different prevailing environments. The paper tries to highlight the pros and cons of the models and compares them for possible control strategies that could be achieved. It is the desire that others in the research community requiring to learn more on the speed and the dynamics of the changing worm literature can find it interesting to look at. IRACST Press 2012 Article PeerReviewed Mohammed, Aliyu and Mohd. Nor, Sulaiman and Marsono, Muhammad Nadzir (2012) Analysis of internet malware propagation models and mitigation strategies. International Journal of Computer Networks and Wireless Communications, 2 (1). pp. 16-20. ISSN 2250-3501 (Electronic) https://www.iracst.org/ijcnwc/papers/vol2no12012/3vol2no1.pdf |
institution |
Universiti Teknologi Malaysia |
building |
UTM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Malaysia |
content_source |
UTM Institutional Repository |
url_provider |
http://eprints.utm.my/ |
topic |
TK Electrical engineering. Electronics Nuclear engineering |
spellingShingle |
TK Electrical engineering. Electronics Nuclear engineering Mohammed, Aliyu Mohd. Nor, Sulaiman Marsono, Muhammad Nadzir Analysis of internet malware propagation models and mitigation strategies |
description |
The Internet application has been so popular in the recent times and the concepts of network worms are now the biggest threats to the network security researchers. The trend at which network structure variables and its related applications such as p2p network has given the malware on the internet an avenue to explore as rapidly as possible and to find ways from which they can propagate. Hence, the need for an accurate mathematical worm propagation model is of paramount desire for the internet. In this paper a conceptualized analysis of the worm propagation models are discussed for the different prevailing environments. The paper tries to highlight the pros and cons of the models and compares them for possible control strategies that could be achieved. It is the desire that others in the research community requiring to learn more on the speed and the dynamics of the changing worm literature can find it interesting to look at. |
format |
Article |
author |
Mohammed, Aliyu Mohd. Nor, Sulaiman Marsono, Muhammad Nadzir |
author_facet |
Mohammed, Aliyu Mohd. Nor, Sulaiman Marsono, Muhammad Nadzir |
author_sort |
Mohammed, Aliyu |
title |
Analysis of internet malware propagation models and mitigation strategies |
title_short |
Analysis of internet malware propagation models and mitigation strategies |
title_full |
Analysis of internet malware propagation models and mitigation strategies |
title_fullStr |
Analysis of internet malware propagation models and mitigation strategies |
title_full_unstemmed |
Analysis of internet malware propagation models and mitigation strategies |
title_sort |
analysis of internet malware propagation models and mitigation strategies |
publisher |
IRACST Press |
publishDate |
2012 |
url |
http://eprints.utm.my/id/eprint/31671/ https://www.iracst.org/ijcnwc/papers/vol2no12012/3vol2no1.pdf |
_version_ |
1643648825080938496 |
score |
13.211869 |