Worm

View this topic in
The term worm refers to an obsolete taxon used by Carolus Linnaeus and Jean-Baptiste Lamarck for all non-arthropod invertebrate animals, and stems from the Old English word wyrm. (Wikipedia.org)






Conferences related to Worm

Back to Top

ICC 2021 - IEEE International Conference on Communications

IEEE ICC is one of the two flagship IEEE conferences in the field of communications; Montreal is to host this conference in 2021. Each annual IEEE ICC conference typically attracts approximately 1,500-2,000 attendees, and will present over 1,000 research works over its duration. As well as being an opportunity to share pioneering research ideas and developments, the conference is also an excellent networking and publicity event, giving the opportunity for businesses and clients to link together, and presenting the scope for companies to publicize themselves and their products among the leaders of communications industries from all over the world.


2020 IEEE International Conference on Robotics and Automation (ICRA)

The International Conference on Robotics and Automation (ICRA) is the IEEE Robotics and Automation Society’s biggest conference and one of the leading international forums for robotics researchers to present their work.


2020 IEEE Nuclear Science Symposium and Medical Imaging Conference (NSS/MIC)

All areas of ionizing radiation detection - detectors, signal processing, analysis of results, PET development, PET results, medical imaging using ionizing radiation


2020 IEEE Symposium on Security and Privacy (SP)

Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2021 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2019 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2018 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2017 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2016 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2015 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2014 IEEE Symposium on Security and Privacy (SP)

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2013 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2012 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2011 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2010 IEEE Symposium on Security and Privacy (SP)

    S&P is interested in all aspects of computer security and privacy.

  • 2009 IEEE Symposium on Security and Privacy (SP)

    The IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2008 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2007 IEEE Symposium on Security and Privacy (SP)

    Research contributions in any aspect of computer security and electronic privacy including advances in the theory, design, implementation, analysis of empirical evaluation of secure systems.

  • 2006 IEEE Symposium on Security and Privacy (SP)

  • 2005 IEEE Symposium on Security and Privacy (SRSP)


2020 IEEE/ASME International Conference on Advanced Intelligent Mechatronics (AIM)

The scope of the 2020 IEEE/ASME AIM includes the following topics: Actuators, Automotive Systems, Bioengineering, Data Storage Systems, Electronic Packaging, Fault Diagnosis, Human-Machine Interfaces, Industry Applications, Information Technology, Intelligent Systems, Machine Vision, Manufacturing, Micro-Electro-Mechanical Systems, Micro/Nano Technology, Modeling and Design, System Identification and Adaptive Control, Motion Control, Vibration and Noise Control, Neural and Fuzzy Control, Opto-Electronic Systems, Optomechatronics, Prototyping, Real-Time and Hardware-in-the-Loop Simulation, Robotics, Sensors, System Integration, Transportation Systems, Smart Materials and Structures, Energy Harvesting and other frontier fields.


More Conferences

Periodicals related to Worm

Back to Top

Antennas and Wireless Propagation Letters, IEEE

IEEE Antennas and Wireless Propagation Letters (AWP Letters) will be devoted to the rapid electronic publication of short manuscripts in the technical areas of Antennas and Wireless Propagation.


Applied Superconductivity, IEEE Transactions on

Contains articles on the applications and other relevant technology. Electronic applications include analog and digital circuits employing thin films and active devices such as Josephson junctions. Power applications include magnet design as well asmotors, generators, and power transmission


Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Computer Graphics and Applications, IEEE

IEEE Computer Graphics and Applications (CG&A) bridges the theory and practice of computer graphics. From specific algorithms to full system implementations, CG&A offers a strong combination of peer-reviewed feature articles and refereed departments, including news and product announcements. Special Applications sidebars relate research stories to commercial development. Cover stories focus on creative applications of the technology by an artist or ...


More Periodicals

Most published Xplore authors for Worm

Back to Top

Xplore Articles related to Worm

Back to Top

The Analysis of Worm Non-linear Propagation Model and the Design of Worm Distributed Detection Technology

2010 Ninth International Symposium on Distributed Computing and Applications to Business, Engineering and Science, 2010

At present there are some worm intrusion detection systems, primarily for a single LAN or with hardware router environment, which are not applicable for large-scale network detection or have high false alarm rate by using only worm propagation characteristics for detection. This paper analyzed worm non-linear propagation models and drew out the worm transmission curves. Then a distributed worm detection ...


A worm counter-measurement strategy in P2P networks: Modeling and analysis

2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems, 2012

As a new active countermeasure, the technology of worm-anti-worm has great potentiality in worm defense, and has gradually become a hotspot of network security. This paper proposes two strategies to defend against malicious worm based on benign worm; develops two worm-anti-worm models based on different attack strategies combining the dynamic characteristics of P2P worm propagation, assesses the key parameters to ...


P2P Anti-worm: Modeling and Analysis of a New Worm Counter-measurement Strategy

2008 The 9th International Conference for Young Computer Scientists, 2008

This paper proposes a new kind of anti-worm called P2P anti-worm which propagates using P2P techniques. A mathematical analysis of this new approach is conducted and a mathematical model of P2P anti-worm is introduced to analyze the propagation. Simulation is made on SSFNET to compare the P2P anti- worm and pure random scan worm. The simulation results show that P2P ...


The research of worm distributed detection technology based on network security

2010 IEEE International Conference on Wireless Communications, Networking and Information Security, 2010

At present there are some worm detection systems, primarily for a single LAN or with hardware router environment, which main use worm propagation characteristics for detection and has high false alarm rate, but it is not applicable for large-scale network for detecting. This paper presents a distributed worm detection technology, which is divided into two parts, client end and the ...


A New Vaccine for Worm Vaccination

2010 International Conference on Artificial Intelligence and Computational Intelligence, 2010

The mechanism of active counter-attack on worms has been developed and studied for several years. The worm vaccination, a kind of active counter-attack on worms, has some preliminary results. But further research is still required. In this work, we explored a new vaccine to promote the release time through ana-lyzing the structure proposed by Castaneda F, and presented its structure ...


More Xplore Articles

Educational Resources on Worm

Back to Top

IEEE-USA E-Books

  • The Analysis of Worm Non-linear Propagation Model and the Design of Worm Distributed Detection Technology

    At present there are some worm intrusion detection systems, primarily for a single LAN or with hardware router environment, which are not applicable for large-scale network detection or have high false alarm rate by using only worm propagation characteristics for detection. This paper analyzed worm non-linear propagation models and drew out the worm transmission curves. Then a distributed worm detection technology is designed. The novel distributed worm detection system consists of two parts, client end and console end programs. The system uses rule-based detection method to monitor network worms, and the console side manages and coordinates detection work of the client sides. Experimental results show that the technology is a good solution to worm detection in multiple network environments which can give an alarm with high detection rate and low false alarm rate when the known worm appears.

  • A worm counter-measurement strategy in P2P networks: Modeling and analysis

    As a new active countermeasure, the technology of worm-anti-worm has great potentiality in worm defense, and has gradually become a hotspot of network security. This paper proposes two strategies to defend against malicious worm based on benign worm; develops two worm-anti-worm models based on different attack strategies combining the dynamic characteristics of P2P worm propagation, assesses the key parameters to affect the propagation speed of malicious worm. The numerical analysis on the proposed strategy indicates that our solution can slow down the spreading speed of malicious worms dramatically by employing benign worms, prevent the transmission of malicious worms in P2P networks efficiently. We believe our work provides useful guidance for defending against worms in P2P networks.

  • P2P Anti-worm: Modeling and Analysis of a New Worm Counter-measurement Strategy

    This paper proposes a new kind of anti-worm called P2P anti-worm which propagates using P2P techniques. A mathematical analysis of this new approach is conducted and a mathematical model of P2P anti-worm is introduced to analyze the propagation. Simulation is made on SSFNET to compare the P2P anti- worm and pure random scan worm. The simulation results show that P2P anti-worm can slow down the speed of the malicious worm. Then this paper discusses the relationship between the propagation speed and the P2P overlay average degree, the initial number of the anti-worm and the release time delay. It is noticed from the experiments that the P2P feature makes anti-worm safer, and its propagation more stabile, more controllable and cost less.

  • The research of worm distributed detection technology based on network security

    At present there are some worm detection systems, primarily for a single LAN or with hardware router environment, which main use worm propagation characteristics for detection and has high false alarm rate, but it is not applicable for large-scale network for detecting. This paper presents a distributed worm detection technology, which is divided into two parts, client end and the console end program. The system uses the rule-based detection methods to monitor network worms, and the console side manages and coordinates the multiple side work of detecting. Experimental results show that the method can be good applicable for worms conduct surveillance based on a single or multiple local area network and is used for worm alarming, the method has high detection rate and low false alarm rate.

  • A New Vaccine for Worm Vaccination

    The mechanism of active counter-attack on worms has been developed and studied for several years. The worm vaccination, a kind of active counter-attack on worms, has some preliminary results. But further research is still required. In this work, we explored a new vaccine to promote the release time through ana-lyzing the structure proposed by Castaneda F, and presented its structure and generation method. The new vaccine is evaluated by Blaster, Nachi and Sasser worm. It shows that the proposed vaccine reduces the release time up to 71% and is applied to worm vaccination successfully.

  • A survey of internet worm propagation models

    Although the frequency of Internet worm's outbreak is decreased, the impact of worm on people's wealth security and society's stabilization is still an unnegligible problem, especially the emergence of botnet. With the growth of variable network structure and applications, such as P2P network, Internet worms can explore more fast and covert ways to propagate. Hence, an accurate worm propagation model is urgently needed. In this paper, the concept and structure of worms are presented, then the typical propagation models in different environment are discussed, and the Advantages and Disadvantages of different models are given. It is our hope that others in the community who need to get up to speed in the worm literature can benefit from this survey.

  • A P2P-Based Worm in Next Gernation Network

    In recent years, many IPv6 networks have been deployed, and the security issues of which arouse more and more public concern. It is commonly believed that IPv6 provides greater security against random-scanning worms by virtue of a very large address space. However, a clever worm can develop a more intelligent scanning strategy to find target hosts. This paper presents a worm which uses the p2p-based hit-list scan strategy to propagate. This worm applied a two-level scanning mechanism to find its targets in IPv6 internet. Based on this idea, we model the behavior of such a worm, and simulation is performed to validate the worm propagation model. Research results demonstrate that this worm can significantly promotes worm propagation in IPv6 internet. We hope that our work can assist in detecting and limiting future worm propagation.

  • Effects of firewall on worm propagation

    The outbreak of worm is very frequent today. It has great impact on the society infrastructure and people's wealth security. A large number of experts have devoted themselves to the research of worm propagation modeling. Both deterministic model and stochastic model have been used in modeling worm spread. In this paper, we analyze the worm functional structure, and then propose a deterministic worm model based on two-factor worm mode, named FWM model, by considering the impact of firewall on the worm propagation. The worm propagation model we proposed is more flexible than two-factor model. It can reflect the change of worm propagation dynamically. In addition, based on the simple worm model, we analyze the firewall penetration technology on the worm propagation. The result of simulation shows that the use of firewall blocks the worm's spread speed.

  • Worm detection and containment in local networks

    To curb worm spread, it is vital to detect worms in time and restrict the victims' network behavior effectively. A worm detection and containment system for local networks is proposed. Normal service requests are characterized with the self-set, which is applied to monitor for suspicious service requests. The system correlates the suspicious service requests in the form of binary trees, and binary trees' anomaly values are monitored for worm attacks. Possible worm victims are determined from the binary trees. Based on the self-set, the worm victims' normal traffic is permitted while their worm activities are strictly contained. Experiments show the system contains worms effectively, and the detrimental effect of the system's deployment on normal network traffic is negligible.

  • Simulation and Evaluation OF A New Algorithm of Worm Detection and Containment

    Internet worm attacks have become increasingly more frequent and have caused enormous damage to the Internet community during the past years. A new security service that monitors the ongoing worm activities on the Internet and restricts the worm spreading rate automatically will greatly contribute to the security management of modern enterprise networks. Based on the comparison and analysis of many worm detection and containment strategies, a new and effective algorithm of detecting and containing network worms is proposed in this paper. The principle of this effective algorithm is an improved two rotation process to detect and contain worms. The simulation result of the algorithm is demonstrated so effectively to detect and slow down the rapid scanning worm and "stealthy" worm whose propagation rate is slower than the former. In order to reduce the number of false positives, the impact of normal network activities is also concerned. Finally, the simulation also analyzes the performance of detecting worms of the algorithm under normal and congestive network background



Standards related to Worm

Back to Top

No standards are currently tagged "Worm"


Jobs related to Worm

Back to Top