Publication TypeJournal Article
Year of Publication2019
Start Page267
Date Published01/2019

In this note we give how can be make a new precise analysis of the situation with spreading of Code Red worm as well Witty worm. These worms were actively spread from 00:00 UTC July 19, 2001 to 00:00 UTC July 20, 2001 and on March 19, 2004, at approximately 8:45 p.m. Pacific Standard Time (PST) respectively. Here we give a new way of treating these epidemics using Dagum-II sigmoid function [1]-[7].

Refereed DesignationRefereed
Full Text

[1] C. Kleiber, A Guide to the Dagum Distribution. In: Modeling Income Distributions and Lorenz Curves: Essays in Memory of Camilo Dagum, D. Chotikapanich (ed.), Springer-Verlag, New York, (2008).
[2] C. Dagum, A new method of personal income distribution: Specification and estimation, Economie Appliquee, 33, (1977), 413-437.
[3] C. Dagum, Generating systems and properties of income distribution models, Metron, 38, (1980), 3-26.
[4] C. Dagum, Sistemas generadores de distribucion de ingreso y la ley de Pareto, El Trimestre Economico, 47, (1980), 877-917.
[5] C. Dagum, Income distribution models. In: S. Kotz, N.L. Johnson, and C. Read (eds.): Encyclopedia of Statistical Sciences, Vol.4, John Wiley, New York, (1983), 27-34.
[6] C. Dagum, Generation and properties of income distribution functions. In: Dagim, C. and Zenga, M. (eds.): Income and Wealth Distribution, Inequality and Poverty: Proceedings of the Second International Conference on Income Distribution by Size: Generation, Distribution, Measurement and Applications New York-Berlin-Tokyo, Springer, (1990), 7-17.
[7] C. Kleiber, S. Kotz, Statistical size distribution in economics and actuarial sciences, Wiley, New York, (2003).
[8] F. Hausdorff, Set Theory, 2 ed., Chelsea Publ., New York, (1962).
[9] B. Sendov, Hausdorff Approximations, Kluwer, Boston, (1990).
[10] N. Kyurkchiev, S. Markov, Sigmoidal functions: Some Approximation and Modeling Aspects. Some Modules in Programming Environment MATHEMATICA, LAP LAMBERT Academic Publishing, Saarbrucken, (2015).
[11] N. Kyurkchiev, A. Iliev, S. Markov, Some techniques for recurrence generating of activation functions, LAP LAMBERT Academic Publishing, (2017).
[12] N. Pavlov, A. Iliev, A. Rahnev, N. Kyurkchiev, Some software reliability models: Approximation and modeling aspects, LAP LAMBERT Academic Publishing, (2018).
[13] N. Pavlov, A. Iliev, A. Rahnev, N. Kyurkchiev, Nontrivial Models in Debugging Theory (Part 2), LAP LAMBERT Academic Publishing, (2018).
[14] N. Kyurkchiev, A. Iliev, Extension of Gompertz-type Equation in Modern Science: 240 Anniversary of the birth of B. Gompertz, LAP LAMBERT Academic Publishing, (2018).
[15] N. Kyurkchiev, A. Iliev, A Note on the Dagum-II Sigmoid Function with Applications to Wealth Data. Other Applications, Pliska Stud. Math., 30, (2019), 117-126.
[16] D. Moore, C. Shannon, J. Brown, Code-Red: a case study on the spread and victims of an Internet worm, Internet Measurement Workshop (IMW), (2002), 273-284.
[17] C. Zou, W. Gong, D. Towsley, Code red worm propagation modeling and analysis, CCS ’02 Proceedings of the 9th ACM conference on Computer and communications security, (2002), 138-147.
[18] C. Zou, L. Gao, W. Gong, D. Towsley, Monitoring and early warning for internet worms, CCS ’03 Proceedings of the 10th ACM conference on Computer and communications security, (2003), 190-199.
[19] C. Zou, D. Towsley, W. Gong, Songlin Cai, Advanced Routing Worm and Its Security Challenges, Simulation, 82, No. 1 (2006), 75-85.
[20] C. Zou, D. Towsley, W. Gong, Modeling and Simulation Study of the Propagation and Defense of Internet E-mail Worms, IEEE Transactions on Dependable and Secure Computing, 4, No. 2 (2007), 105-118.
[21] C. Zou, W. Gong, D. Towsley, Worm propagation modeling and analysis under dynamic quarantine defense, Proceedings of the 2003 ACM workshop on Rapid malcode, October 27-27, (2003), Washington, DC, USA.
[22] C. Zou, D. Towsley, W. Gong, On the performance of internet worm scanning strategies, Performance Evaluation, 63, No. 7 (2006), 700-723.
[23] C. Zou,W. Gong, D. Towsley, L. Gao, The monitoring and early detection of internet worms, IEEE/ACM Transactions on Networking (TON), 13, No. 5 (2005), 961-974.
[24] P. Wang, L. Wu, R. Cunningham, C. Zou, Honeypot detection in advanced botnet attacks, International Journal of Information and Computer Security, 4, No. 1 (2010), 30-51.
[25] A. Visheratin, M. Melnik, D. Nasonov, N. Butakov, A. Boukhanovsky, Hybrid scheduling algorithm in early warning systems, Future Generation Computer Systems, 79, No. P2 (2018), 630-642.
[26] J. Jerkins, J. Stupiansky, Mitigating IoT insecurity with inoculation epidemics, Proceedings of the ACMSE 2018 Conference, March 29-31, (2018), 1-6, Richmond, Kentucky.
[27] Q. Xiao, S. Chen, M. Chen, Y. Ling, Hyper-Compact Virtual Estimators for Big Network Data Based on Register Sharing, ACM SIGMETRICS Performance Evaluation Review, 43, No. 1 (2015), 417-428.
[28] H. Asghari, M. Ciere, M. Van Eeten, Post-mortem of a zombie: conficker cleanup after six years, Proceedings of the 24th USENIX Conference on Security Symposium, August 12-14, (2015), 1-16, Washington, D.C.
[29] A. Dainotti, A. King, K. Claffy, F. Papale, A. Pescape, Analysis of a ”/0” stealth scan from a botnet, IEEE/ACM Transactions on Networking (TON), 23, No. 2 (2015), 341-354.
[30] D. Lee, J. Kim, K. Kim, A study on abnormal event correlation analysis for convergence security monitor, Cluster Computing, 16, No. 2 (2013), 219-227.
[31] E. Magkos, M. Avlonitis, P. Kotzanikolaou, M. Stefanidakis, Toward early warning against Internet worms based on critical-sized networks, Security and Communication Networks, 6, No. 1 (2013), 78-88.
[32] S. Xu, W. Lu, L. Xu, Push- and pull-based epidemic spreading in networks: Thresholds and deeper insights, ACM Transactions on Autonomous and Adaptive Systems (TAAS), 7, No. 3 (2012), 1-26.
[33] C. Shannon, D. Moore, The Spread of the Witty Worm, IEEE Security & Privacy, July/August, (2004), 46-50.
[34] A. Mohammed, S. Nor, M. Marsono, Analysis of Internet Malware Propagation Models and Mitigation Strategies, IRACST International Journal of Computer Networks and Wireless Communications (IJCNWC), 2, No. 1 (2012), 16-20.
[35] S. Staniford, V. Paxsony, N. Weaver, How to own the Internet in Your Spare Time, Proceedings of the 11th USENIX Security Symposium, San Francisco, California, USA, August 5-9, (2002).
[36] S. Fei, L. Zhaowen, M. Yan, A survey of Internet Worm Propagation Models, Proceedings of IC-BNMT2009, (2009), 453-457.
[37] S. Fei, L. Zhaowen, M. Yan, Worm Propagation based on Two-Factor Model, Proceedings of 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing, (2009), 4 pp.
[38] D. Smith, L. Moore, The SIR model for the Spread of Diseases, JOMA, (2004).
[39] J. Kim, S. Radhakrishnan, S. Dhall, Measurement and Analysis of worm propagation on Internet network topology, Proceedings of 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969), 495-500.
[40] T. Li, Z. Guan, Y. Wang, The Stability of a Worm Propagation Model with Time Delay on Homogeneous Networks, Proceedings of International Conference on Intelligent Control and Information Processing, August 13-15, (2010) - Dalian, China, 753-755.
[41] T. Li, Z.-H. Guan, Y. Wang, Y. Li, Impulsive Control of the Spread of worm with Nonlinear Incidence Rates, Proceedings of 2010 Chinese Control and Decision Conference, (2010), 966-969.
[42] Y. Wang, Z.-H. Guan, T. Li, S. Zhang, Modeling and Analyzing the Spread of Worm with Impulsive Effect on Homogeneous Network, Proceedings of 2010 International Conference on Computer Application and System Modeling (ICCASM 2010), (2010), V7-501-V7-504.
[43] C. Junhua,W. Shengjun, Modeling and Analyzing the Spread of worms with Bilinear Incidence Rate, Proceedings of 2009 Fifth International Conference on Information Assurance and Security, (2009), 167-170.
[44] W. Shaojie, L. Qiming, D. Bo, M. Weining, Analysis of a Mathematical Model for Worm Virus Propagation with time delay, Proceedings of 2009 Second International Conference on Environmental and Computer Science, (2009), 375-379.
[45] D. Zhang, Y. Wang, SIRS: Internet Worm Propagation and Application, Proceedings of 2010 International Conference on Electrical and Control Engineering, (2010), 3029-3032.
[46] Q. Liu, R. Xu, S. Wang, Modeling and Analysis of an SIRS Model for worm Propagation, Proceedings of 2009 International Conference on Computational Intelligence and Security, (2009), 361-365.
[47] S. Fei, L. Zhao-wen, M. Yan, Modeling and Analysis of Internet worm propagation, The Journal of China Universities of Posts and Telecommunications, 17, No. 4 (2010), 63-68.
[48] J. Wang, C. Xia, Q. Liu, A novel Model for the Internet Worm Propagation, Proceedings of 2010 Sixth International Conference on Natural Computation (ICNC 2010), (2010), 2885-2888.
[49] F. Wang, J. Song, Y. Dong, J. Gu, Epidemic models applied to worms on internet, Proceedings of 2009 Second International Conference on Intelligent Networks and Intelligent Systems, (2009), 160-163.
[50] Z. Wei, Q. Facheng, C. Shiqi, W. Ruchuan, The Study of Network Worm Propagation Simulation, Proceedings of 2010 International Conference on Computer Application and System Modeling (ICCASM 2010), (2010), V9-295-V9-299.
[51] Liuqi, M. Guoqing, The research and development of worm defense strategies, Proceedings of 2010 3rd International Conference on Computer Science and Information Technology, (2010), 168-171.
[52] F.Wang, Y. Zhang, C. Wang, J. Ma, S. Moon, Stability analysis of a SEIQV epidemic for rapid spreading worms, Computer & Security, 29 (2010), 410-418.
[53] Y. Yao, H. Guo, F. Gao, G. Yu, The Worm Propagation Model with pulse Quarantine Strategy, Proceedings of 2010 International Conference on Multimedia Information Networking and Security, (2010), 269-273.
[54] H. Zhang, W. Su, W. Quan, Smart Collaborative Identifier Network: A Promising Design for Future Internet, Springer-Verlag, Berlin (2016).
[55] X. Wang, J. Zhu, H. Lin, X. Su, Y. Jiang, Modeling Propagation of Active P2P Worm in Chord Network, In: Advances in Intelligent and Soft Computing, J. Kacprzyk eds., 133 (2012), S. Sambath & E. Zhu (Eds.), Frontiers in Computer Education, 383-390.
[56] Y. Xiao, F. Li, H. Chen, eds., Handbook of Security and Networks, World Scientific, Singapore (2011).
[57] S. Sellke, N. Shroff, S. Bagchi, Modeling and Automated Containment of Worms, Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN05), (2005), 10 pp.
[58] W. Yu, C. Boyer, S. Chellappan, D. Xuan, Peer-to-peer system-based active worm attacks: modeling and analysis, IEEE International Conference on Communications, 2005, (2005), 295-300.
[59] S. Zhang,Z. Jin, J. Zhang, The Dynamical Modeling Analysis of the Spreading of Passive Worms in P2P Networks, Discrete Dynamics in Nature and Society, 2018, Article ID 1656907, (2018), 13 pp.
[60] G. Yan, S. Eidenbenz, Modeling Propagation Dynamics of Bluetooth Worms (Extended Version), IEEE Transactions on Mobile Computing, 8, No. 3 (2009), 353-367.
[61] S. Sellke, N. Shroff, S. Bagchi, Modeling and Automated Containment of Worms, IEEE Transactions on Dependable and Secure Computing, 5, No. 2 (2008), 71-86.
[62] S. Peng, M. Wua, G. Wang, S. Yu, Propagation Model of Smartphone Worms Based on Semi-Markov Process and Social Relationship Graph, Computers & Security, 44 (2014), 92-103.