31 resultados para worm

em Deakin Research Online - Australia


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Each year, large amounts of money and labor are spent on patching the vulnerabilities in operating systems and various popular software to prevent exploitation by worms. Modeling the propagation process can help us to devise effective strategies against those worms' spreading. This paper presents a microcosmic analysis of worm propagation procedures. Our proposed model is different from traditional methods and examines deep inside the propagation procedure among nodes in the network by concentrating on the propagation probability and time delay described by a complex matrix. Moreover, since the analysis gives a microcosmic insight into a worm's propagation, the proposed model can avoid errors that are usually concealed in the traditional macroscopic analytical models. The objectives of this paper are to address three practical aspects of preventing worm propagation: (i) where do we patch? (ii) how many nodes do we need to patch? (iii) when do we patch? We implement a series of experiments to evaluate the effects of each major component in our microcosmic model. Based on the results drawn from the experiments, for high-risk vulnerabilities, it is critical that networks reduce the number of vulnerable nodes to below 80%. We believe our microcosmic model can benefit the security industry by allowing them to save significant money in the deployment of their security patching schemes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In recent years, wide attention has been drawn to the problem of containing worm propagation in smartphones. Unlike existing containment models for worm propagation, we study how to prevent worm propagation through the immunization of key nodes (e.g.; the top k influential nodes). Thus, we propose a novel containment model based on an influence maximization algorithm. In this model, we introduce a social relation graph to evaluate the influence of nodes and an election mechanism to find the most influential nodes. Finally, this model provides a targeted immunization strategy to disable worm propagation by immunizing the top k influential nodes. The experimental results show that the model not only finds the most influential top k nodes quickly, but also effectively restrains and controls worm propagation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There is a substantial need to develop new medicines against parasitic diseases via public-private partnerships. Based on high throughput phenotypic screens of largely protozoal pathogens and bacteria, the Medicines for Malaria Venture (MMV) has recently assembled an open-access 'Pathogen Box' containing 400 well-curated chemical compounds. In the present study, we tested these compounds for activity against parasitic stages of the nematode Haemonchus contortus (barber's pole worm). In an optimised, whole-organism screening assay, using exsheathed third-stage (xL3) and fourth-stage (L4) larvae, we measured the inhibition of larval motility, growth and development of H. contortus. We also studied the effect of the 'hit' compound on mitochondrial function by measuring oxygen consumption. Among the 400 Pathogen Box compounds, we identified one chemical, called tolfenpyrad (compound identification code: MMV688934) that reproducibly inhibits xL3 motility as well as L4 motility, growth and development, with IC50 values ranging between 0.02 and 3 μM. An assessment of mitochondrial function showed that xL3s treated with tolfenpyrad consumed significantly less oxygen than untreated xL3s, which was consistent with specific inhibition of complex I of the respiratory electron transport chain in arthropods. Given that tolfenpyrad was developed as a pesticide and has already been tested for absorption, distribution, excretion, biotransformation, toxicity and metabolism, it shows considerable promise for hit-to-lead optimisation and/or repurposing for use against H. contortus and other parasitic nematodes. Future work should assess its activity against hookworms and other pathogens that cause neglected tropical diseases.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The purpose of this paper is to provide a platform for investigating the relationship between the student and the tutor via the design drawing and in particular the idea that what gives grounds for architecture to embody something is what is imagined is expressed in the design drawing. It is suggested that in architectural education the sense of architecture's fabricated properties find their apparent expression from the convergence of the tutor and student toward these drawings. In an act of perceptual contortion, there is an endeavour to reconcile what they see with what they think the drawing might suggest. Part of this mental reconstruction is based on the expectation that something is in the drawing to see. The drawing is produced based on the supposition that it will be read, generating a particular conditioning of the student's attitude toward the relevance of the drawing. It is engaged as the receptacle of ideas about what architecture is. The result is that sometimes the emphasis on the drawing as something to be consumed implies a permeation of the supposed sensory qualities of architecture imagined by the student designer, the portrayal of which is indubitably a product of the medium. While this might be commonly experienced in studios, it is proposed that this may be perpetuated in architectural education not merely by the act of drawing itself and what the drawing is, but how the student/tutor exchange contributes to the consciousness of what is portrayed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

An analysis of log files from an immune World Wide Web server was used to discover the patterns of infection from the Code Red worm variants.  Analogies are drawn to biological systems.  The need for protection is commented on.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Propagation of Peer-to-Peer (P2P) worms in the Internet is posing a serious challenge to network security research because of P2P worms' increasing complexity and sophistication. Due to the complexity of the problem, no existing work has solved the problem of modeling the propagation of P2P worms, especially when quarantine of peers is enforced. This paper presents a study on modeling the propagation of P2P worms. It also presents our applications of the proposed approach in worm propagation research.

Motivated by our aspiration to invent an easy-to-employ instrument for worm propagation research, the proposed approach models the propagation processes of P2P worms by difference equations of a logic matrix, which are essentially discrete-time deterministic propagation models of P2P worms. To the best of our knowledge, we are the first using a logic matrix in network security research in general and worm propagation modeling in particular.

Our major contributions in this paper are firstly, we propose a novel logic matrix approach to modeling the propagation of P2P worms under three different conditions; secondly, we find the impacts of two different topologies on a P2P worm's attack performance; thirdly, we find the impacts of the network-related characteristics on a P2P worm's attack performance in structured P2P networks; and fourthly, we find the impacts of the two different quarantine tactics on the propagation characteristics of P2P worms in unstructured P2P networks. The approach's ease of employment, which is demonstrated by its applications in our simulation experiments, makes it an attractive instrument to conduct worm propagation research.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A highly ordered poly(dimethyl siloxane)-poly(glycidyl methacrylate) (PDMS-PGMA) reactive diblock copolymer was synthesized and used to modify bisphenol A-type epoxy resin (ER). The PDMS-PGMA block copolymer consisted of epoxy-miscible PGMA blocks and an epoxy-immiscible PDMS block. The PGMA reactive block of the block copolymer formed covalent bonds with cured epoxy and was involved in the network formation, and the PDMS block phase separated to give different ordered and disordered nanostructures at different blend compositions. The solvent cast PDMS-PGMA diblock copolymer showed ordered hexagonal cylindrical morphology. A highly ordered morphology consisting of hexagonal cylinders inside the lamellar morphology was observed in the cured PDMS-PGMA block copolymer. In the cured ER/PDMS-PGMA blends, a variety of morphologies including lamellar, cubic and worm-like and spherical nanostructures were detected depending on the blend composition. Moreover, the addition of this reactive diblock copolymer significantly increases the hydrophobicity and the glass transition temperature. It also improves the tensile strength and tensile ductility of the nanostructured thermosets at low diblock copolymer contents.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There are the two common means for propagating worms: scanning vulnerable computers in the network and sending out malicious email attachments. Modeling the propagation of worms can help us understand how worms spread and devise effective defence strategies. Most traditional models simulate the overall scale of infected network in each time tick, making them invalid for examining deep inside the propagation procedure among individual nodes. For this reason, this paper proposes a novel probability matrix to model the propagation mechanism of the two main classes of worms (scanning and email worms) by concentrating on the propagation probability. The objective of this paper is to access the spreading and work out an effective scheme against the worms. In order to evaluate the effects of each major component in our probability model, we implement a series of experiments for both worms. From the results, the network administrators can make decision on how to reduce the number of vulnerable nodes to a certain threshold for scanning worms, and how to immunize the highly-connected node for preventing worm's propagation for email worms.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A botnet is a group of compromised computers, which are remotely controlled by hackers to launch various network attacks, such as DDoS attack and information phishing. Botnet has become a popular and productive tool behind many cyber attacks. Recently, the owners of some botnets, such as storm worm, torpig and conflicker, are employing fluxing techniques to evade detection. Therefore, the understanding of their fluxing tricks is critical to the success of defending from botnet attacks. Motivated by this, we survey the latest botnet attacks and defenses in this paper. We begin with introducing the principles of fast fluxing (FF) and domain fluxing (DF), and explain how these techniques were employed by botnet owners to fly under the radar. Furthermore, we investigate the state-of-art research on fluxing detection. We also compare and evaluate those fluxing detection methods by multiple criteria. Finally, we discuss future directions on fighting against botnet based attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Active Peer-to-Peer worms are great threat to the network security since they can propagate in automated ways and flood the Internet within a very short duration. Modeling a propagation process can help us to devise effective strategies against a worm's spread. This paper presents a study on modeling a worm's propagation probability in a P2P overlay network and proposes an optimized patch strategy for defenders. Firstly, we present a probability matrix model to construct the propagation of P2P worms. Our model involves three indispensible aspects for propagation: infected state, vulnerability distribution and patch strategy. Based on a fully connected graph, our comprehensive model is highly suited for real world cases like Code Red II. Finally, by inspecting the propagation procedure, we propose four basic tactics for defense of P2P botnets. The rationale is exposed by our simulated experiments and the results show these tactics are of effective and have considerable worth in being applied in real-world networks.