File Download

There are no files associated with this item.

  • Find it @ UNIST can give you direct access to the published full text of this article. (UNISTARs only)
Related Researcher

장봉수

Jang, Bongsoo
Computational Mathematical Science Lab.
Read More

Views & Downloads

Detailed Information

Cited time in webofscience Cited time in scopus
Metadata Downloads

Influence evaluation of centrality-based random scanning strategy on early worm propagation rate

Author(s)
Kown, Su-kyungJang, BongsooLee, Byoung-DaiDo, YounghaeBaek, HunkiChoi, Yoon-Ho
Issued Date
2016-08-25
DOI
10.1007/978-3-319-56549-1_8
URI
https://scholarworks.unist.ac.kr/handle/201301/39728
Fulltext
https://link.springer.com/chapter/10.1007%2F978-3-319-56549-1_8
Citation
17th International Workshop on Information Security Applications (WISA 2016), v.10144 LNCS, pp.90 - 101
Abstract
Smart devices interconnected through Internet became one of everyday items. In particular, we are now able to access Internet anywhere and anytime with our smartphones. To support the ad-hoc access to Internet by using smartphones, the computer network structure has become more complex. Also, a certain network node is highly connected to support the diverse Internet services. In this paper, we note that when a node is infected by malicious programs, their propagation speeds from the node with a high level of centrality will be faster than those from the node with a low level of centrality, which identifies the most important nodes within a network. From experiments under diverse worm propagation parameters and the well-known network topologies, we evaluate the influence of Centrality-based random scanning strategy on early worm propagation rate. Therefore, we show that centrality-based random scanning strategy, where an initial infected node selects the victim based on the level of centrality, can make random scanning worms propagate rapidly compared to Anonymity-based random scanning strategy, where an initial infected node selects the victim uniformly.
Publisher
International Workshop on Information Security Applications
ISSN
0302-9743

qrcode

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.