2008 International Symposium on Electronic Commerce and Security 2008
DOI: 10.1109/isecs.2008.187
|View full text |Cite
|
Sign up to set email alerts
|

A P2P E-commerce Related Network Security Issue: P2P Worm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…A worm is independent and neither requires a host application [ 84 , 87 , 92 ] nor human intervention [ 82 ] to propagate and replicate itself over a network. Worms can result in a high fallout in combination with other vulnerabilities and propagate themselves over email attachments, web server infections, file downloads (counterfeit worms), or other legitimate network activities (silent worms) [ 78 , 81 , 82 , 84 , 87 ].…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…A worm is independent and neither requires a host application [ 84 , 87 , 92 ] nor human intervention [ 82 ] to propagate and replicate itself over a network. Worms can result in a high fallout in combination with other vulnerabilities and propagate themselves over email attachments, web server infections, file downloads (counterfeit worms), or other legitimate network activities (silent worms) [ 78 , 81 , 82 , 84 , 87 ].…”
Section: Resultsmentioning
confidence: 99%
“…A worm is independent and neither requires a host application [ 84 , 87 , 92 ] nor human intervention [ 82 ] to propagate and replicate itself over a network. Worms can result in a high fallout in combination with other vulnerabilities and propagate themselves over email attachments, web server infections, file downloads (counterfeit worms), or other legitimate network activities (silent worms) [ 78 , 81 , 82 , 84 , 87 ]. Passive (counterfeit and silent worms) and active worms are 2 broader categories of P2P worms; they both propagate like a biological virus, but the former waits for victims to infect, while the latter actively searches for new targets [ 84 ].…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation