Internet worm attacks have become increasingly more
frequent and have had a
major impact on the economy, making the detection and
prevention of these attacks a top
security concern. Several counter-measures have been
proposed and evaluated in recent
literature. However, the effect of these proposed
defensive mechanisms on legitimate competing traffic
has not been analyzed.
This book presents a comparative analysis of the
effectiveness of several of these proposed mechanisms,
including a measure of their effect on normal web
browsing activities.
This book also presents a study of the behavior of
TCP based worms in MANETs.
We develop an analytical model for the worm spread of
TCP worms in the MANETs environment that accounts for
payload-size,
bandwidth-sharing, radio range, nodal density and
several other parameters speci c for MANET
topologies. We also present numerical solutions for
the model and verify the results using
packet-level simulations. The results show
that the analytical model developed here matches the
results of the packet-level simulation
in most cases.
frequent and have had a
major impact on the economy, making the detection and
prevention of these attacks a top
security concern. Several counter-measures have been
proposed and evaluated in recent
literature. However, the effect of these proposed
defensive mechanisms on legitimate competing traffic
has not been analyzed.
This book presents a comparative analysis of the
effectiveness of several of these proposed mechanisms,
including a measure of their effect on normal web
browsing activities.
This book also presents a study of the behavior of
TCP based worms in MANETs.
We develop an analytical model for the worm spread of
TCP worms in the MANETs environment that accounts for
payload-size,
bandwidth-sharing, radio range, nodal density and
several other parameters speci c for MANET
topologies. We also present numerical solutions for
the model and verify the results using
packet-level simulations. The results show
that the analytical model developed here matches the
results of the packet-level simulation
in most cases.