DocumentCode :
1467432
Title :
Locating Defense Positions for Thwarting the Propagation of Topological Worms
Author :
Wen, Sheng ; Zhou, Wei ; Wang, Yini ; Zhou, Wanlei ; Xiang, Yang
Author_Institution :
Sch. of Inf. Sci. & Eng., Central South Univ., Changsha, China
Volume :
16
Issue :
4
fYear :
2012
fDate :
4/1/2012 12:00:00 AM
Firstpage :
560
Lastpage :
563
Abstract :
A common view for the preferable positions of thwarting worm propagation is at the highly connected nodes. However, in certain conditions, such as when some popular users (highly connected nodes in the network) have more vigilance on the malicious codes, this may not always be the truth. In this letter, we propose a measure of betweenness and closeness to locate the most suitable positions for slowing down the worm propagation. This work provides practical values to the defense of topological worms.
Keywords :
computer network security; telecommunication network topology; defense position localisation; highly connected nodes; malicious codes; network security; topological worm propagation; Computational modeling; Grippers; Internet; Peer to peer computing; Security; Social network services; Topology; Network security; propagation; worms;
fLanguage :
English
Journal_Title :
Communications Letters, IEEE
Publisher :
ieee
ISSN :
1089-7798
Type :
jour
DOI :
10.1109/LCOMM.2012.030512.112452
Filename :
6168149
Link To Document :
بازگشت