Title :
Locating Defense Positions for Thwarting the Propagation of Topological Worms
Author :
Wen, Sheng ; Zhou, Wei ; Wang, Yini ; Zhou, Wanlei ; Xiang, Yang
Author_Institution :
Sch. of Inf. Sci. & Eng., Central South Univ., Changsha, China
fDate :
4/1/2012 12:00:00 AM
Abstract :
A common view for the preferable positions of thwarting worm propagation is at the highly connected nodes. However, in certain conditions, such as when some popular users (highly connected nodes in the network) have more vigilance on the malicious codes, this may not always be the truth. In this letter, we propose a measure of betweenness and closeness to locate the most suitable positions for slowing down the worm propagation. This work provides practical values to the defense of topological worms.
Keywords :
computer network security; telecommunication network topology; defense position localisation; highly connected nodes; malicious codes; network security; topological worm propagation; Computational modeling; Grippers; Internet; Peer to peer computing; Security; Social network services; Topology; Network security; propagation; worms;
Journal_Title :
Communications Letters, IEEE
DOI :
10.1109/LCOMM.2012.030512.112452