Gong, "On the performance of
Internet worm scanning strategies," Performance Evaluation, vol.
Although most of previous works can offer useful insight into the
Internet worm propagations, some of them fail to grasp the detail that has important impact on the worm propagation.
Su, "A survey of
internet worm detection and containment," IEEE Com.
The method suggested in this paper is to automatically detect and classify three major network traffic attacks: Distributed Denial of Service (DDos), Denial of Service (DoS), and
Internet Worm. Each of the network traffic attacks is briefly described as follows.
Tong, "Pulse quarantine strategy of
internet worm propagation: modeling and analysis," Computers and Electrical Engineering, 2011.
Popular online social networking site Tumblr was ravaged on Monday by an
Internet worm that spewed racist and inflammatory messages across thousands of user accounts.
Analyzing a group with the same attachment file can be useful in detecting an
Internet worm that is spread via email.
Genetic algorithm based
internet worm propagation strategy modeling, Information Technology and Control 37(2): 133-140.
That weapon is likely to be a variant of Stuxnet, a highly destructive
Internet worm discovered by a Belarus company in June and described by European security company Kaspersky Labs as 'a fearsome prototype of a cyber-weapon', they said.
First detected back in November 2008, Conficker (an
Internet Worm targeting PCs) has infected millions of computers worldwide and is still running rampant.