ACM DL

Modeling and Computer Simulation (TOMACS)

Menu

Search Issue
enter search term and/or author name

Archive


ACM Transactions on Modeling and Computer Simulation (TOMACS), Volume 18 Issue 2, April 2008

Efficient simulation of Internet worms
David M. Nicol
Article No.: 5
DOI: 10.1145/1346325.1346326

Simulation of Internet worms (and other malware) requires tremendous computing resources when every packet generated by the phenomena is modeled individually; on the other hand, models of worm growth based on differential equations lack the...

A model of the spread of randomly scanning Internet worms that saturate access links
George Kesidis, Ihab Hamadeh, Youngmi Jin, Soranun Jiwasurat, Milan Vojnović
Article No.: 6
DOI: 10.1145/1346325.1346327

We present a simple, deterministic mathematical model for the spread of randomly scanning and bandwidth-saturating Internet worms. Such worms include Slammer and Witty, both of which spread extremely rapidly. Our model, consisting of coupled...

A behavioral theory of insider-threat risks: A system dynamics approach
Ignacio J. Martinez-Moyano, Eliot Rich, Stephen Conrad, David F. Andersen, Thomas R. Stewart
Article No.: 7
DOI: 10.1145/1346325.1346328

The authors describe a behavioral theory of the dynamics of insider-threat risks. Drawing on data related to information technology security violations and on a case study created to explain the dynamics observed in that data, the authors...

Deterministic and stochastic models for the detection of random constant scanning worms
Kurt R. Rohloff, Tamer Bacşar
Article No.: 8
DOI: 10.1145/1346325.1346329

This article discusses modeling and detection properties associated with the stochastic behavior of Random Constant Scanning (RCS) worms. Although these worms propagate by randomly scanning network addresses to find hosts that are susceptible to...