Open Access Open Access  Restricted Access Subscription or Fee Access

An E-Epidemic Model for Developing a Defense Mechanism against Computer Worms

Upendra Kumar, Bimal Kumar Mishra, G. Sahoo


We have developed a defense mechanism for worms free computer network. The trusted hosts are peer to peer connected but gateways, firewalls, routers and trusted hosts are hierarchically related with each other. For worms free computer network, we have developed a mathematical model in which different computer network devices like Gateways, Firewalls, and Routers etc are used as parameters. The concept of trusted hosts have been used to help routers and firewalls for transmission of alarming signals. To detect and filtrate the worms, firewall and routers are used. The gateways have been used to connect the different type of LAN. Some host may not have alarming message, so that hosts may be either infected or completely free from worms. Further some infected hosts have been filtered by single level hierarchical back off dynamic mechanism. Finally heavily attacked worms related host have to quarantine. In all
type of hosts, the concept of natural death has been used.


Gateways; Routers; Trusted hosts; Quarantined hosts; Single Level Hierarchical Backoff Dynamic Mechanism; Alarming Message.

Full Text:



Eugene H. Spafford ,“The internet worms: crisis and after maths”, Communications of the ACM,32(6): 678-687, June 1989.

Leitold.F,”Mathematical model of computer viruses”, EICAR, Best paper proceding,pp. 194-217,2000.

Computer Security system Evaluation Criteria(The Orange Book)7,DOD 5200 28-STD,1985

C. G. Senthil Kumar and Karlevitt,”Hierarchical Controlled Cooperative Response Strategies for Internet scale attacks” ,University of Clifornia,Davis,January 2003.

Nicholas Weaver, “Futer defense: “Technologies to stop the unknown attack”, Feb 2002.

Stuart Stainford,Vern Paxson and Nichlos Weaver,”How to own the internate in your spare time”,Summer USENIX conference Berkely CA,In procedding of 2002.

C. G. Senthil Kumar, Worms how to stop them, Master Thesis University of California, July 2002.

Eugene H. Spafford,” Internet worms program: An analysis”, Technica Reports CSD-TR-823 Purdue University, West Lafayette,INUSA, Dec-1998.

Security policies and security model IEEE, Symposiam on security and Privacy, 21 ,982.

Senthil kumar, G. Cheetancheri, Modeling a computer worms Defense Chap-8, Ph. D Thesis, University of Carlifornia, 2004.

B. K. Mishra, N. Jha, SEIQRS model for the transmission of malicious object in computer network, Applied Mathematical Modeling, 710- 715,(34),2010.

D. Noijiri, J. Rowe and K. Levitt,” Cooperative Response Strategies for large scale attack mitigation “, DISCEX, 2002.

Feiertag,R.J,”A technique for proving specification and multilevel secure, Technical report CSI,109,CSL,SRI International,1980.

Focardi,R and Gorrieri,R,”A classification of security


Heidelherper p.Weleh ,P.D.: Simulation length control in the present of initial transient Operitcs 31 1109-1144,1983.

Keeling. M.,Grenfell,B.T.:Effect of variability in infection period on the persistence of spatial spread of infectious disease Math,.Biosci 147,207-226,1998 .

Bimal Kumar Mishra, Samir Kumar Pandey, Fuzzy epidemic model for the transmission of worms in Computer network, Nonlinear Analysis:Real World Applications, 11 (2010) 4335-4341.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.