2013
DOI: 10.1016/j.apm.2013.03.051
|View full text |Cite
|
Sign up to set email alerts
|

Dynamical analysis and control strategies on malware propagation model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
33
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 48 publications
(33 citation statements)
references
References 22 publications
0
33
0
Order By: Relevance
“…Due to the existence of time delay, vaccinated hosts go through a temporary state (delayed state) after the failure of vaccination before becoming susceptible. In this paper, we try to establish a realistic worm propagation model, motivated by the works [7,27]. This model can give deep insight into predicting worm spread in networks.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Due to the existence of time delay, vaccinated hosts go through a temporary state (delayed state) after the failure of vaccination before becoming susceptible. In this paper, we try to establish a realistic worm propagation model, motivated by the works [7,27]. This model can give deep insight into predicting worm spread in networks.…”
Section: Introductionmentioning
confidence: 99%
“…Gan et al [25] show that some nonlinear incidence rates may be conducive to the containment of computer viruses. Feng et al [27] have proposed the SIRS model with a variable infection rate which plays an important role in the spread of the Internet worm. We consider that the vaccinated hosts (the immunizing hosts) may turn to susceptible hosts (the hosts liable to infection by worms) if the worm variants appear or the patches lose efficacy, and this process may take a period of time.…”
Section: Introductionmentioning
confidence: 99%
“…Unlike the traditional signature-based malicious code detection method, this allows for the detection of a malicious code that is newly emerging and that takes a detour around the detection method. However, there is the possibility of a false-positive where normal files are mistaken for being malicious codes [17].…”
Section: Technologies For the Analysis And Detection Of Malicious Behmentioning
confidence: 99%
“…In addition, Figure 2 represents the scenario for detecting APT attack as to 1, 3, 4, 5, 6 among the steps of APT attack mentioned in Section 2.2. Step 1 (Detection Scenario of Step 1,3,4,5,6). See Figure 2.…”
Section: Service Scenariomentioning
confidence: 99%
“…An APT attack is one of the major cyber-attacks in addition to targeted attack. It is a module to use all the things known about the attack [3]. The some of the prominent cases for APT attack include Stuxnet, Duqu, Red October, Mask, etc., and each of these attacks had a different target and purpose.…”
Section: Introductionmentioning
confidence: 99%