Analysis of internet malware propagation models and mitigation strategies

The Internet application has been so popular in the recent times and the concepts of network worms are now the biggest threats to the network security researchers. The trend at which network structure variables and its related applications such as p2p network has given the malware on the internet an...

Full description

Saved in:
Bibliographic Details
Main Authors: Mohammed, Aliyu, Mohd. Nor, Sulaiman, Marsono, Muhammad Nadzir
Format: Article
Published: IRACST Press 2012
Subjects:
Online Access:http://eprints.utm.my/id/eprint/31671/
https://www.iracst.org/ijcnwc/papers/vol2no12012/3vol2no1.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknologi Malaysia
id my.utm.31671
record_format eprints
spelling my.utm.316712019-03-25T08:18:22Z http://eprints.utm.my/id/eprint/31671/ Analysis of internet malware propagation models and mitigation strategies Mohammed, Aliyu Mohd. Nor, Sulaiman Marsono, Muhammad Nadzir TK Electrical engineering. Electronics Nuclear engineering The Internet application has been so popular in the recent times and the concepts of network worms are now the biggest threats to the network security researchers. The trend at which network structure variables and its related applications such as p2p network has given the malware on the internet an avenue to explore as rapidly as possible and to find ways from which they can propagate. Hence, the need for an accurate mathematical worm propagation model is of paramount desire for the internet. In this paper a conceptualized analysis of the worm propagation models are discussed for the different prevailing environments. The paper tries to highlight the pros and cons of the models and compares them for possible control strategies that could be achieved. It is the desire that others in the research community requiring to learn more on the speed and the dynamics of the changing worm literature can find it interesting to look at. IRACST Press 2012 Article PeerReviewed Mohammed, Aliyu and Mohd. Nor, Sulaiman and Marsono, Muhammad Nadzir (2012) Analysis of internet malware propagation models and mitigation strategies. International Journal of Computer Networks and Wireless Communications, 2 (1). pp. 16-20. ISSN 2250-3501 (Electronic) https://www.iracst.org/ijcnwc/papers/vol2no12012/3vol2no1.pdf
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
topic TK Electrical engineering. Electronics Nuclear engineering
spellingShingle TK Electrical engineering. Electronics Nuclear engineering
Mohammed, Aliyu
Mohd. Nor, Sulaiman
Marsono, Muhammad Nadzir
Analysis of internet malware propagation models and mitigation strategies
description The Internet application has been so popular in the recent times and the concepts of network worms are now the biggest threats to the network security researchers. The trend at which network structure variables and its related applications such as p2p network has given the malware on the internet an avenue to explore as rapidly as possible and to find ways from which they can propagate. Hence, the need for an accurate mathematical worm propagation model is of paramount desire for the internet. In this paper a conceptualized analysis of the worm propagation models are discussed for the different prevailing environments. The paper tries to highlight the pros and cons of the models and compares them for possible control strategies that could be achieved. It is the desire that others in the research community requiring to learn more on the speed and the dynamics of the changing worm literature can find it interesting to look at.
format Article
author Mohammed, Aliyu
Mohd. Nor, Sulaiman
Marsono, Muhammad Nadzir
author_facet Mohammed, Aliyu
Mohd. Nor, Sulaiman
Marsono, Muhammad Nadzir
author_sort Mohammed, Aliyu
title Analysis of internet malware propagation models and mitigation strategies
title_short Analysis of internet malware propagation models and mitigation strategies
title_full Analysis of internet malware propagation models and mitigation strategies
title_fullStr Analysis of internet malware propagation models and mitigation strategies
title_full_unstemmed Analysis of internet malware propagation models and mitigation strategies
title_sort analysis of internet malware propagation models and mitigation strategies
publisher IRACST Press
publishDate 2012
url http://eprints.utm.my/id/eprint/31671/
https://www.iracst.org/ijcnwc/papers/vol2no12012/3vol2no1.pdf
_version_ 1643648825080938496