ISBN-13: 9783639133950 / Angielski / Miękka / 2009 / 108 str.
Internet worm attacks have become increasingly more frequent and have had a major impact on the economy, making the detection and prevention of these attacks a top security concern. Several counter-measures have been proposed and evaluated in recent literature. However, the effect of these proposed defensive mechanisms on legitimate competing traffic has not been analyzed. This book presents a comparative analysis of the effectiveness of several of these proposed mechanisms, including a measure of their effect on normal web browsing activities. This book also presents a study of the behavior of TCP based worms in MANETs. We develop an analytical model for the worm spread of TCP worms in the MANETs environment that accounts for payload-size, bandwidth-sharing, radio range, nodal density and several other parameters speci c for MANET topologies. We also present numerical solutions for the model and verify the results using packet-level simulations. The results show that the analytical model developed here matches the results of the packet-level simulation in most cases."
Internet worm attacks have become increasingly morefrequent and have had a major impact on the economy, making the detection andprevention of these attacks a top security concern. Several counter-measures have beenproposed and evaluated in recent literature. However, the effect of these proposeddefensive mechanisms on legitimate competing traffichas not been analyzed. This book presents a comparative analysis of theeffectiveness of several of these proposed mechanisms,including a measure of their effect on normal webbrowsing activities. This book also presents a study of the behavior ofTCP based worms in MANETs. We develop an analytical model for the worm spread ofTCP worms in the MANETs environment that accounts forpayload-size,bandwidth-sharing, radio range, nodal density and several other parameters specific for MANETtopologies. We also present numerical solutions forthe model and verify the results usingpacket-level simulations. The results show that the analytical model developed here matches theresults of the packet-level simulation in most cases.