X-Swarm: The Upcoming Swarm Worm
dc.contributor.author | Truong, Thanh Cong | |
dc.contributor.author | Diep, Quoc Bao | |
dc.contributor.author | Zelinka, Ivan | |
dc.contributor.author | Dao, Than Trong | |
dc.coverage.issue | 1 | cs |
dc.coverage.volume | 26 | cs |
dc.date.accessioned | 2020-09-01T07:01:24Z | |
dc.date.available | 2020-09-01T07:01:24Z | |
dc.date.issued | 2020-08-24 | cs |
dc.description.abstract | With the rapid growth of technology in the digital landscape, cybercriminals attempt to utilize new and sophisticated techniques to autonomous and increase the speed and scale of their attacks. Meanwhile, the Dark Web infrastructures such as Tor, plays a crucial role in the criminal underground, especially for malware developers' communities. It is logical to expect that the malicious actors would utilize the combination of these techniques in shortcoming time. To better understand the upcoming threat, in this manuscript, we investigate the design and mitigation of such malware. Accordingly, we introduce X-sWarm, which will be the next generation of resilient, stealthy malware that leverages the intelligent technique and the darknet infrastructures. Furthermore, we show that with the self-healing network mechanism, X-sWarm can achieve a low diameter and a low degree and be robust to partitioning under node removal. More importantly, we suggest the mitigation technique that neutralizes the nodes of the proposed worm. | en |
dc.format | text | cs |
dc.format.extent | 7-14 | cs |
dc.format.mimetype | application/pdf | en |
dc.identifier.citation | Mendel. 2020 vol. 26, č. 1, s. 7-14. ISSN 1803-3814 | cs |
dc.identifier.doi | 10.13164/mendel.2020.1.007 | en |
dc.identifier.issn | 2571-3701 | |
dc.identifier.issn | 1803-3814 | |
dc.identifier.uri | http://hdl.handle.net/11012/195021 | |
dc.language.iso | en | cs |
dc.publisher | Institute of Automation and Computer Science, Brno University of Technology | cs |
dc.relation.ispartof | Mendel | cs |
dc.relation.uri | https://mendel-journal.org/index.php/mendel/article/view/112 | cs |
dc.rights | Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International license | en |
dc.rights.access | openAccess | en |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-sa/4.0 | en |
dc.subject | Swarm intelligence | en |
dc.subject | malware | en |
dc.subject | Tor | en |
dc.subject | cybersecurity | en |
dc.subject | self-healing network | en |
dc.title | X-Swarm: The Upcoming Swarm Worm | en |
dc.type.driver | article | en |
dc.type.status | Peer-reviewed | en |
dc.type.version | publishedVersion | en |
eprints.affiliatedInstitution.faculty | Fakulta strojního inženýrství | cs |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- 112-Article Text-216-1-10-20200826.pdf
- Size:
- 883.08 KB
- Format:
- Adobe Portable Document Format
- Description: