Notice of RetractionThe research and development of worm defense strategies

The deterioration of worm propagation on internet in recent years has pushed the research in the field of worm defense, as a result there are coming up plenty of worm defense strategies. This paper refers to make the systematic study of the complete worm defense strategies and provide taxonomy of worm defense system strategies according to the key factors of each defense category. As guideline for the design of worm defense, we compare the present evaluation of the worm defense strategies, and give a highlight on the trendy of worm defense in the future at the end.

[1]  Niels Provos,et al.  A Virtual Honeypot Framework , 2004, USENIX Security Symposium.

[2]  Dawn Xiaodong Song,et al.  Dynamic quarantine of Internet worms , 2004, International Conference on Dependable Systems and Networks, 2004.

[3]  George Kesidis,et al.  Evaluation of Collaborative Worm Containments on DETER Testbed , 2007, DETER.

[4]  Karl N. Levitt,et al.  A hybrid quarantine defense , 2004, WORM '04.

[5]  Peng Liu,et al.  Evaluation of collaborative worm containment on the DETER testbed , 2007 .

[6]  David Moore,et al.  Code-Red: a case study on the spread and victims of an internet worm , 2002, IMW '02.

[7]  Matthew M. Williamson,et al.  Throttling viruses: restricting propagation to defeat malicious mobile code , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..

[8]  Vern Paxson,et al.  How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.

[9]  David Moore,et al.  Internet quarantine: requirements for containing self-propagating code , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[10]  Angelos D. Keromytis,et al.  A cooperative immunization system for an untrusting Internet , 2003, The 11th IEEE International Conference on Networks, 2003. ICON2003..

[11]  Phillip A. Porras,et al.  Microscopic simulation of a group defense strategy , 2005, Workshop on Principles of Advanced and Distributed Simulation (PADS'05).

[12]  Yong Tang,et al.  Slowing down Internet worms , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..

[13]  David M. Nicol,et al.  Comparing passive and active worm defenses , 2004, First International Conference on the Quantitative Evaluation of Systems, 2004. QEST 2004. Proceedings..

[14]  D. Song,et al.  Taxonomy and Effectiveness of Worm Defense Strategies , 2005 .

[15]  Karl N. Levitt,et al.  Towards a framework for worm-defense evaluation , 2006, 2006 IEEE International Performance Computing and Communications Conference.

[16]  Stuart E. Schechter,et al.  Fast Detection of Scanning Worm Infections , 2004, RAID.