SlideShare a Scribd company logo
1 of 2
Download to read offline
Penn State researchers' code targets 'stealthy' computer worms

Monday, February 1, 2010



University Park, Pa. -- Self-propagating worms are malicious computer programs,
which, after being released, can spread throughout networks without human
control, stealing or erasing hard drive data, interfering with pre-installed
programs and slowing, even crashing, home and work computers. Now a new code, or
algorithm, created by Penn State researchers targets the "stealthiest" of these
worms, containing them before an outbreak can occur.

"In 2001 the 'Code Red' worms caused $2 billion dollars worth of damage
worldwide," said Yoon-Ho Choi, a postdoctoral fellow in information sciences and
technology, Penn State. "Our algorithm can prevent a worm's propagation early in
its propagation stage."

Choi and his colleagues' algorithm defends against the spread of local scanning
worms that search for hosts in "local" spaces within networks or sub-networks.
This strategy allows them access to hosts that are clustered, which means once
they infect one host, the rest can be can be infected quickly. There are many
types of scanning worms, but Choi calls these worms the stealthiest because they
are the most efficient and can evade even the best worm defenses.

A worm outbreak can begin with the infection of a single computer. After
infection, a worm begins to probe a set of random, local or enterprise IP
addresses, searching for more vulnerable hosts. When one is found the worm sends
out a probe, or packet, to infect it.

"A local scanning worm can purposely scan a local or enterprise network only,"
said Choi. "As the size of the susceptible population increases, the worm's
virulence increases."

The researchers' algorithm works by estimating the size of the susceptible host
population. It then monitors the occurrence of infections within it and sets a
threshold value just equal to or below the average number of scans necessary to
infect a host by an infected host.




                                           Page 1 of 2
Penn State researchers' code targets 'stealthy' computer worms

If the scanning worm's number of scans carrying a specific destination port
number exceeds the threshold, the algorithm quarantines the worm. The algorithm
then breaks down the network into many small networks, or cells, which in some
cases might be only one computer. A worm can spread within the cells, but not
between the cells. This way the algorithm can isolate an infected host or small
cluster of infected hosts housing the worm.

"By applying the containment thresholds from our proposed algorithm, outbreaks
can be blocked early," said Choi.

To test the effectiveness of their algorithm the researchers ran a series of
computer simulations and emulations using different scanning strategies of local
scanning worms. Results showed that their algorithm was an efficient estimator
of worm virulence and could determine the size of the susceptible host
population after only a few infections.

"Our evaluation showed that the algorithm is reliable in the very early
propagation stage and is better than the state-of-the-art defense," said Choi.

Choi, working with Lunquan Li, assistant professor, Institute of
Microelectronics, Chinese Academy of Sciences, Beijing, and his Penn State
colleagues, Peng Liu, associate professor, information sciences and technology,
and George Kesidis, professor, electrical engineering and computer science and
engineering, published their work in the February issue of Computers and
Security.

According to Choi, local scanning worms are constantly evolving. They are
becoming more complicated and increasingly efficient. As a result, worm
outbreaks pose a real threat to networked systems. Because many networked home
and office computers are susceptible to local scanning worms this algorithm may
be an effective defense against damaging worm outbreaks.


Contact
Andrea Messer
Email: aem1@psu.edu




                                            Page 2 of 2

More Related Content

What's hot

An optimal distributed malware defense system for mobile networks with hetero...
An optimal distributed malware defense system for mobile networks with hetero...An optimal distributed malware defense system for mobile networks with hetero...
An optimal distributed malware defense system for mobile networks with hetero...Shakas Technologie
 
JPJ1451 Optimal Distributed Malware Defense in Mobile Networks with Heteroge...
JPJ1451  Optimal Distributed Malware Defense in Mobile Networks with Heteroge...JPJ1451  Optimal Distributed Malware Defense in Mobile Networks with Heteroge...
JPJ1451 Optimal Distributed Malware Defense in Mobile Networks with Heteroge...chennaijp
 
2011 modeling and detection of camouflaging worm
2011   modeling and detection of camouflaging worm2011   modeling and detection of camouflaging worm
2011 modeling and detection of camouflaging wormdeepikareddy123
 
Intruder adaptability
Intruder adaptabilityIntruder adaptability
Intruder adaptabilityugilad
 
Design and Implementation of an Android Malware Detector based on Hidden Mark...
Design and Implementation of an Android Malware Detector based on Hidden Mark...Design and Implementation of an Android Malware Detector based on Hidden Mark...
Design and Implementation of an Android Malware Detector based on Hidden Mark...Enrico Micco
 
An effective architecture and algorithm for detecting worms with various scan...
An effective architecture and algorithm for detecting worms with various scan...An effective architecture and algorithm for detecting worms with various scan...
An effective architecture and algorithm for detecting worms with various scan...UltraUploader
 
A framework to detect novel computer viruses via system calls
A framework to detect novel computer viruses via system callsA framework to detect novel computer viruses via system calls
A framework to detect novel computer viruses via system callsUltraUploader
 
Optimised malware detection in digital forensics
Optimised malware detection in digital forensicsOptimised malware detection in digital forensics
Optimised malware detection in digital forensicsIJNSA Journal
 
Biologically inspired defenses against computer viruses
Biologically inspired defenses against computer virusesBiologically inspired defenses against computer viruses
Biologically inspired defenses against computer virusesUltraUploader
 
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATION
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATIONNETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATION
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATIONIJITE
 
Fighting computer viruses
Fighting computer virusesFighting computer viruses
Fighting computer virusesNguyễn Anh
 
A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLS
A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLSA SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLS
A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLSIJNSA Journal
 
Ijfls05
Ijfls05Ijfls05
Ijfls05ijfls
 

What's hot (16)

An optimal distributed malware defense system for mobile networks with hetero...
An optimal distributed malware defense system for mobile networks with hetero...An optimal distributed malware defense system for mobile networks with hetero...
An optimal distributed malware defense system for mobile networks with hetero...
 
JPJ1451 Optimal Distributed Malware Defense in Mobile Networks with Heteroge...
JPJ1451  Optimal Distributed Malware Defense in Mobile Networks with Heteroge...JPJ1451  Optimal Distributed Malware Defense in Mobile Networks with Heteroge...
JPJ1451 Optimal Distributed Malware Defense in Mobile Networks with Heteroge...
 
2011 modeling and detection of camouflaging worm
2011   modeling and detection of camouflaging worm2011   modeling and detection of camouflaging worm
2011 modeling and detection of camouflaging worm
 
Intruder adaptability
Intruder adaptabilityIntruder adaptability
Intruder adaptability
 
Design and Implementation of an Android Malware Detector based on Hidden Mark...
Design and Implementation of an Android Malware Detector based on Hidden Mark...Design and Implementation of an Android Malware Detector based on Hidden Mark...
Design and Implementation of an Android Malware Detector based on Hidden Mark...
 
An effective architecture and algorithm for detecting worms with various scan...
An effective architecture and algorithm for detecting worms with various scan...An effective architecture and algorithm for detecting worms with various scan...
An effective architecture and algorithm for detecting worms with various scan...
 
A framework to detect novel computer viruses via system calls
A framework to detect novel computer viruses via system callsA framework to detect novel computer viruses via system calls
A framework to detect novel computer viruses via system calls
 
H0434651
H0434651H0434651
H0434651
 
Univ 100 research presentation
Univ 100 research presentationUniv 100 research presentation
Univ 100 research presentation
 
Optimised malware detection in digital forensics
Optimised malware detection in digital forensicsOptimised malware detection in digital forensics
Optimised malware detection in digital forensics
 
A0430104
A0430104A0430104
A0430104
 
Biologically inspired defenses against computer viruses
Biologically inspired defenses against computer virusesBiologically inspired defenses against computer viruses
Biologically inspired defenses against computer viruses
 
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATION
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATIONNETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATION
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATION
 
Fighting computer viruses
Fighting computer virusesFighting computer viruses
Fighting computer viruses
 
A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLS
A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLSA SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLS
A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLS
 
Ijfls05
Ijfls05Ijfls05
Ijfls05
 

Similar to Penn State Researchers Code Targets Stealthy Computer Worms

2011 modeling and detection of camouflaging worm
2011   modeling and detection of camouflaging worm2011   modeling and detection of camouflaging worm
2011 modeling and detection of camouflaging wormdeepikareddy123
 
Modeling and Containment of Uniform Scanning Worms
Modeling and Containment of Uniform Scanning WormsModeling and Containment of Uniform Scanning Worms
Modeling and Containment of Uniform Scanning WormsIOSR Journals
 
X-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligenceX-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligenceIJECEIAES
 
Biological models of security for virus propagation in computer networks
Biological models of security for virus propagation in computer networksBiological models of security for virus propagation in computer networks
Biological models of security for virus propagation in computer networksUltraUploader
 
Modeling & automated containment of worms(synopsis)
Modeling & automated containment of worms(synopsis)Modeling & automated containment of worms(synopsis)
Modeling & automated containment of worms(synopsis)Mumbai Academisc
 
2011-A_Novel_Approach_to_Troubleshoot_Security_Attacks_in_Local_Area_Networks...
2011-A_Novel_Approach_to_Troubleshoot_Security_Attacks_in_Local_Area_Networks...2011-A_Novel_Approach_to_Troubleshoot_Security_Attacks_in_Local_Area_Networks...
2011-A_Novel_Approach_to_Troubleshoot_Security_Attacks_in_Local_Area_Networks...Mrunalini Koritala
 
Application of hardware accelerated extensible network nodes for internet wor...
Application of hardware accelerated extensible network nodes for internet wor...Application of hardware accelerated extensible network nodes for internet wor...
Application of hardware accelerated extensible network nodes for internet wor...UltraUploader
 
C-Worm Traffic Detection using Power Spectral Density and Spectral Flatness ...
C-Worm Traffic Detection using Power Spectral Density and  Spectral Flatness ...C-Worm Traffic Detection using Power Spectral Density and  Spectral Flatness ...
C-Worm Traffic Detection using Power Spectral Density and Spectral Flatness ...IOSR Journals
 
Biological aspects of computer virology
Biological aspects of computer virologyBiological aspects of computer virology
Biological aspects of computer virologyUltraUploader
 
Utilization Data Mining to Detect Spyware
Utilization Data Mining to Detect Spyware Utilization Data Mining to Detect Spyware
Utilization Data Mining to Detect Spyware IOSR Journals
 
Detecting Unknown Insider Threat Scenarios
Detecting Unknown Insider Threat Scenarios Detecting Unknown Insider Threat Scenarios
Detecting Unknown Insider Threat Scenarios ijcsa
 
Malware Propagation in Large-Scale Networks
Malware Propagation in Large-Scale NetworksMalware Propagation in Large-Scale Networks
Malware Propagation in Large-Scale Networks1crore projects
 
Detection of Replica Nodes in Wireless Sensor Network: A Survey
Detection of Replica Nodes in Wireless Sensor Network: A SurveyDetection of Replica Nodes in Wireless Sensor Network: A Survey
Detection of Replica Nodes in Wireless Sensor Network: A SurveyIOSR Journals
 
Detection of Distributed Clone Attacks for Safety Transactions in WSN
Detection of Distributed Clone Attacks for Safety Transactions in WSNDetection of Distributed Clone Attacks for Safety Transactions in WSN
Detection of Distributed Clone Attacks for Safety Transactions in WSNIJTET Journal
 
Virus detection based on virus throttle technology
Virus detection based on virus throttle technologyVirus detection based on virus throttle technology
Virus detection based on virus throttle technologyAhmed Muzammil
 
Enhancing Intrusion Detection System with Proximity Information
Enhancing Intrusion Detection System with Proximity InformationEnhancing Intrusion Detection System with Proximity Information
Enhancing Intrusion Detection System with Proximity InformationZhenyun Zhuang
 

Similar to Penn State Researchers Code Targets Stealthy Computer Worms (20)

2011 modeling and detection of camouflaging worm
2011   modeling and detection of camouflaging worm2011   modeling and detection of camouflaging worm
2011 modeling and detection of camouflaging worm
 
Modeling and Containment of Uniform Scanning Worms
Modeling and Containment of Uniform Scanning WormsModeling and Containment of Uniform Scanning Worms
Modeling and Containment of Uniform Scanning Worms
 
X-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligenceX-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligence
 
Biological models of security for virus propagation in computer networks
Biological models of security for virus propagation in computer networksBiological models of security for virus propagation in computer networks
Biological models of security for virus propagation in computer networks
 
Modeling & automated containment of worms(synopsis)
Modeling & automated containment of worms(synopsis)Modeling & automated containment of worms(synopsis)
Modeling & automated containment of worms(synopsis)
 
2011-A_Novel_Approach_to_Troubleshoot_Security_Attacks_in_Local_Area_Networks...
2011-A_Novel_Approach_to_Troubleshoot_Security_Attacks_in_Local_Area_Networks...2011-A_Novel_Approach_to_Troubleshoot_Security_Attacks_in_Local_Area_Networks...
2011-A_Novel_Approach_to_Troubleshoot_Security_Attacks_in_Local_Area_Networks...
 
Eh34803812
Eh34803812Eh34803812
Eh34803812
 
Application of hardware accelerated extensible network nodes for internet wor...
Application of hardware accelerated extensible network nodes for internet wor...Application of hardware accelerated extensible network nodes for internet wor...
Application of hardware accelerated extensible network nodes for internet wor...
 
C-Worm Traffic Detection using Power Spectral Density and Spectral Flatness ...
C-Worm Traffic Detection using Power Spectral Density and  Spectral Flatness ...C-Worm Traffic Detection using Power Spectral Density and  Spectral Flatness ...
C-Worm Traffic Detection using Power Spectral Density and Spectral Flatness ...
 
Biological aspects of computer virology
Biological aspects of computer virologyBiological aspects of computer virology
Biological aspects of computer virology
 
Utilization Data Mining to Detect Spyware
Utilization Data Mining to Detect Spyware Utilization Data Mining to Detect Spyware
Utilization Data Mining to Detect Spyware
 
Detecting Unknown Insider Threat Scenarios
Detecting Unknown Insider Threat Scenarios Detecting Unknown Insider Threat Scenarios
Detecting Unknown Insider Threat Scenarios
 
Malware Propagation in Large-Scale Networks
Malware Propagation in Large-Scale NetworksMalware Propagation in Large-Scale Networks
Malware Propagation in Large-Scale Networks
 
Detection of Replica Nodes in Wireless Sensor Network: A Survey
Detection of Replica Nodes in Wireless Sensor Network: A SurveyDetection of Replica Nodes in Wireless Sensor Network: A Survey
Detection of Replica Nodes in Wireless Sensor Network: A Survey
 
P017129296
P017129296P017129296
P017129296
 
Virus vs Anti-Virus
Virus vs Anti-VirusVirus vs Anti-Virus
Virus vs Anti-Virus
 
Detection of Distributed Clone Attacks for Safety Transactions in WSN
Detection of Distributed Clone Attacks for Safety Transactions in WSNDetection of Distributed Clone Attacks for Safety Transactions in WSN
Detection of Distributed Clone Attacks for Safety Transactions in WSN
 
Virus detection based on virus throttle technology
Virus detection based on virus throttle technologyVirus detection based on virus throttle technology
Virus detection based on virus throttle technology
 
Malware1
Malware1Malware1
Malware1
 
Enhancing Intrusion Detection System with Proximity Information
Enhancing Intrusion Detection System with Proximity InformationEnhancing Intrusion Detection System with Proximity Information
Enhancing Intrusion Detection System with Proximity Information
 

More from dgrinnell

The Genius Dilemma (Excerpt)
The Genius Dilemma (Excerpt) The Genius Dilemma (Excerpt)
The Genius Dilemma (Excerpt) dgrinnell
 
The Pressor Response Large Vs. Small Muscle Exercise
The Pressor Response   Large Vs. Small Muscle ExerciseThe Pressor Response   Large Vs. Small Muscle Exercise
The Pressor Response Large Vs. Small Muscle Exercisedgrinnell
 
Age And Fitness On The Pressor Response In Elderly
Age And Fitness On The Pressor Response In ElderlyAge And Fitness On The Pressor Response In Elderly
Age And Fitness On The Pressor Response In Elderlydgrinnell
 
Fitness Affects The Pressor Response To Dynamic Exercise In Older Adults In A...
Fitness Affects The Pressor Response To Dynamic Exercise In Older Adults In A...Fitness Affects The Pressor Response To Dynamic Exercise In Older Adults In A...
Fitness Affects The Pressor Response To Dynamic Exercise In Older Adults In A...dgrinnell
 
U Of Sussex Summer Research
U Of Sussex Summer ResearchU Of Sussex Summer Research
U Of Sussex Summer Researchdgrinnell
 
Progressive Effect Of Endurance Training On Metabolic Adaptations In Working ...
Progressive Effect Of Endurance Training On Metabolic Adaptations In Working ...Progressive Effect Of Endurance Training On Metabolic Adaptations In Working ...
Progressive Effect Of Endurance Training On Metabolic Adaptations In Working ...dgrinnell
 
Blood Pressure Responses To Small And Large Muscle Dynamic Exercise In Older ...
Blood Pressure Responses To Small And Large Muscle Dynamic Exercise In Older ...Blood Pressure Responses To Small And Large Muscle Dynamic Exercise In Older ...
Blood Pressure Responses To Small And Large Muscle Dynamic Exercise In Older ...dgrinnell
 
The Historical And Clinical Significance Of The 6 Minute Walk Test
The Historical And Clinical Significance Of The 6 Minute Walk TestThe Historical And Clinical Significance Of The 6 Minute Walk Test
The Historical And Clinical Significance Of The 6 Minute Walk Testdgrinnell
 
Research May Lead To Better U Vradiation Blocking In Eyeglasses
Research May Lead To Better U Vradiation Blocking In EyeglassesResearch May Lead To Better U Vradiation Blocking In Eyeglasses
Research May Lead To Better U Vradiation Blocking In Eyeglassesdgrinnell
 
Spider Mite Predators Serve As Biological Control
Spider Mite Predators Serve As Biological ControlSpider Mite Predators Serve As Biological Control
Spider Mite Predators Serve As Biological Controldgrinnell
 
Anxiety And Depression Article
Anxiety And Depression ArticleAnxiety And Depression Article
Anxiety And Depression Articledgrinnell
 

More from dgrinnell (11)

The Genius Dilemma (Excerpt)
The Genius Dilemma (Excerpt) The Genius Dilemma (Excerpt)
The Genius Dilemma (Excerpt)
 
The Pressor Response Large Vs. Small Muscle Exercise
The Pressor Response   Large Vs. Small Muscle ExerciseThe Pressor Response   Large Vs. Small Muscle Exercise
The Pressor Response Large Vs. Small Muscle Exercise
 
Age And Fitness On The Pressor Response In Elderly
Age And Fitness On The Pressor Response In ElderlyAge And Fitness On The Pressor Response In Elderly
Age And Fitness On The Pressor Response In Elderly
 
Fitness Affects The Pressor Response To Dynamic Exercise In Older Adults In A...
Fitness Affects The Pressor Response To Dynamic Exercise In Older Adults In A...Fitness Affects The Pressor Response To Dynamic Exercise In Older Adults In A...
Fitness Affects The Pressor Response To Dynamic Exercise In Older Adults In A...
 
U Of Sussex Summer Research
U Of Sussex Summer ResearchU Of Sussex Summer Research
U Of Sussex Summer Research
 
Progressive Effect Of Endurance Training On Metabolic Adaptations In Working ...
Progressive Effect Of Endurance Training On Metabolic Adaptations In Working ...Progressive Effect Of Endurance Training On Metabolic Adaptations In Working ...
Progressive Effect Of Endurance Training On Metabolic Adaptations In Working ...
 
Blood Pressure Responses To Small And Large Muscle Dynamic Exercise In Older ...
Blood Pressure Responses To Small And Large Muscle Dynamic Exercise In Older ...Blood Pressure Responses To Small And Large Muscle Dynamic Exercise In Older ...
Blood Pressure Responses To Small And Large Muscle Dynamic Exercise In Older ...
 
The Historical And Clinical Significance Of The 6 Minute Walk Test
The Historical And Clinical Significance Of The 6 Minute Walk TestThe Historical And Clinical Significance Of The 6 Minute Walk Test
The Historical And Clinical Significance Of The 6 Minute Walk Test
 
Research May Lead To Better U Vradiation Blocking In Eyeglasses
Research May Lead To Better U Vradiation Blocking In EyeglassesResearch May Lead To Better U Vradiation Blocking In Eyeglasses
Research May Lead To Better U Vradiation Blocking In Eyeglasses
 
Spider Mite Predators Serve As Biological Control
Spider Mite Predators Serve As Biological ControlSpider Mite Predators Serve As Biological Control
Spider Mite Predators Serve As Biological Control
 
Anxiety And Depression Article
Anxiety And Depression ArticleAnxiety And Depression Article
Anxiety And Depression Article
 

Penn State Researchers Code Targets Stealthy Computer Worms

  • 1. Penn State researchers' code targets 'stealthy' computer worms Monday, February 1, 2010 University Park, Pa. -- Self-propagating worms are malicious computer programs, which, after being released, can spread throughout networks without human control, stealing or erasing hard drive data, interfering with pre-installed programs and slowing, even crashing, home and work computers. Now a new code, or algorithm, created by Penn State researchers targets the "stealthiest" of these worms, containing them before an outbreak can occur. "In 2001 the 'Code Red' worms caused $2 billion dollars worth of damage worldwide," said Yoon-Ho Choi, a postdoctoral fellow in information sciences and technology, Penn State. "Our algorithm can prevent a worm's propagation early in its propagation stage." Choi and his colleagues' algorithm defends against the spread of local scanning worms that search for hosts in "local" spaces within networks or sub-networks. This strategy allows them access to hosts that are clustered, which means once they infect one host, the rest can be can be infected quickly. There are many types of scanning worms, but Choi calls these worms the stealthiest because they are the most efficient and can evade even the best worm defenses. A worm outbreak can begin with the infection of a single computer. After infection, a worm begins to probe a set of random, local or enterprise IP addresses, searching for more vulnerable hosts. When one is found the worm sends out a probe, or packet, to infect it. "A local scanning worm can purposely scan a local or enterprise network only," said Choi. "As the size of the susceptible population increases, the worm's virulence increases." The researchers' algorithm works by estimating the size of the susceptible host population. It then monitors the occurrence of infections within it and sets a threshold value just equal to or below the average number of scans necessary to infect a host by an infected host. Page 1 of 2
  • 2. Penn State researchers' code targets 'stealthy' computer worms If the scanning worm's number of scans carrying a specific destination port number exceeds the threshold, the algorithm quarantines the worm. The algorithm then breaks down the network into many small networks, or cells, which in some cases might be only one computer. A worm can spread within the cells, but not between the cells. This way the algorithm can isolate an infected host or small cluster of infected hosts housing the worm. "By applying the containment thresholds from our proposed algorithm, outbreaks can be blocked early," said Choi. To test the effectiveness of their algorithm the researchers ran a series of computer simulations and emulations using different scanning strategies of local scanning worms. Results showed that their algorithm was an efficient estimator of worm virulence and could determine the size of the susceptible host population after only a few infections. "Our evaluation showed that the algorithm is reliable in the very early propagation stage and is better than the state-of-the-art defense," said Choi. Choi, working with Lunquan Li, assistant professor, Institute of Microelectronics, Chinese Academy of Sciences, Beijing, and his Penn State colleagues, Peng Liu, associate professor, information sciences and technology, and George Kesidis, professor, electrical engineering and computer science and engineering, published their work in the February issue of Computers and Security. According to Choi, local scanning worms are constantly evolving. They are becoming more complicated and increasingly efficient. As a result, worm outbreaks pose a real threat to networked systems. Because many networked home and office computers are susceptible to local scanning worms this algorithm may be an effective defense against damaging worm outbreaks. Contact Andrea Messer Email: aem1@psu.edu Page 2 of 2