enter search term and/or author name
Simulation of Internet worms (and other malware) requires tremendous computing resources when every packet generated by the phenomena is modeled individually; on the other hand, models of worm growth based on differential equations lack the...
A model of the spread of randomly scanning Internet worms that saturate access links
George Kesidis, Ihab Hamadeh, Youngmi Jin, Soranun Jiwasurat, Milan Vojnović
Article No.: 6
We present a simple, deterministic mathematical model for the spread of randomly scanning and bandwidth-saturating Internet worms. Such worms include Slammer and Witty, both of which spread extremely rapidly. Our model, consisting of coupled...
A behavioral theory of insider-threat risks: A system dynamics approach
Ignacio J. Martinez-Moyano, Eliot Rich, Stephen Conrad, David F. Andersen, Thomas R. Stewart
Article No.: 7
The authors describe a behavioral theory of the dynamics of insider-threat risks. Drawing on data related to information technology security violations and on a case study created to explain the dynamics observed in that data, the authors...
Deterministic and stochastic models for the detection of random constant scanning worms
Kurt R. Rohloff, Tamer Bacşar
Article No.: 8
This article discusses modeling and detection properties associated with the stochastic behavior of Random Constant Scanning (RCS) worms. Although these worms propagate by randomly scanning network addresses to find hosts that are susceptible to...