2018
DOI: 10.1016/j.comcom.2018.04.010
|View full text |Cite
|
Sign up to set email alerts
|

Stochastic modeling of self-evolving botnets with vulnerability discovery

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(5 citation statements)
references
References 25 publications
0
5
0
Order By: Relevance
“…A comprehensive study of the mathematical epidemiology containing several models is presented in Hethcote. 23 Other interesting models can be found in Paul and Mishra, 24 Ren et al, 25 Kudo et al, 26 and Wanget al 27 …”
Section: Motivations and Related Workmentioning
confidence: 91%
See 1 more Smart Citation
“…A comprehensive study of the mathematical epidemiology containing several models is presented in Hethcote. 23 Other interesting models can be found in Paul and Mishra, 24 Ren et al, 25 Kudo et al, 26 and Wanget al 27 …”
Section: Motivations and Related Workmentioning
confidence: 91%
“…A comprehensive study of the mathematical epidemiology containing several models is presented in Hethcote. 23 Other interesting models can be found in Paul and Mishra, 24 Ren et al, 25 Kudo et al, 26 and Wanget al 27 A computer worm is an intelligent virus that can automatically spread through vulnerable (or unprotected) computer applications. Some protection systems are incapable of detecting certain viruses, which are classified as polymorphic viruses, such as Stuxnet.…”
Section: Motivations and Related Workmentioning
confidence: 99%
“…Furthermore, the researchers in [19] exploited the evolutionary algorithm (EA) to generate malware automatically. Kudo et al [20], proposed botnets with adopted ML techniques for prediction of system vulnerabilities and malware selfgoverned evolution. Nevertheless, a search of the literature revealed few studies which address the combination of SI and other intelligence techniques in malware.…”
Section: Introductionmentioning
confidence: 99%
“…Deterministic models are usually global (that is, they suppose that all devices have the same characteristics and the contact topology is homogeneous) and, consequently, they are based on-deterministic-ordinary differential equations [11]). On the other hand, stochastic models can be also global (and based on stochastic differential equations), although the great majority follows the individual paradigm [12,13] and, consequently, takes into account particular characteristics of devices. All of them are compartmental models where the total population of devices is classified into different classes or compartments (depending on the epidemiological state).…”
Section: Introductionmentioning
confidence: 99%