2012
DOI: 10.1016/j.compeleceng.2011.07.009
|View full text |Cite
|
Sign up to set email alerts
|

Pulse quarantine strategy of internet worm propagation: Modeling and analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
32
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 47 publications
(32 citation statements)
references
References 19 publications
0
32
0
Order By: Relevance
“…Considering the fact that the intrusion detection system (IDS) may lead to time delay, Yao et al [13][14][15] obtained the threshold of time delay when Hopf bifurcation occurred. Pulse quarantine strategy [16] also has been taken to constrain the propagation of worms in network. Due to the effect of different topologies, some experts presented different models [9,17] to analyse the results.…”
Section: Introductionmentioning
confidence: 99%
“…Considering the fact that the intrusion detection system (IDS) may lead to time delay, Yao et al [13][14][15] obtained the threshold of time delay when Hopf bifurcation occurred. Pulse quarantine strategy [16] also has been taken to constrain the propagation of worms in network. Due to the effect of different topologies, some experts presented different models [9,17] to analyse the results.…”
Section: Introductionmentioning
confidence: 99%
“…First, the quadratic cost functions may be generalized to some generic functions. Second, delays [43][44][45], pulses [46,47], and random fluctuations [15] may be incorporated to controlled node-level models. Last, but not least, it is worthy to carry out research on the impact of the network topology [9,25,48,49] on the dynamic countermeasure strategy.…”
Section: Discussionmentioning
confidence: 99%
“…They proposed an SEIRQ model for the transmission of virtual threats in a network. Pursing a different perspective to isolation of infected/infective hosts [34] proposed the pulse quarantine strategy (adjudged as better than the constant quarantine strategy). In a conscious bid to ensure security in sensor networks [6] extended the classic model to include the Vaccinated compartment by formulating the SEIRQV mathematical model.…”
Section: Related Workmentioning
confidence: 99%