<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>0120-5609</journal-id>
<journal-title><![CDATA[Ingeniería e Investigación]]></journal-title>
<abbrev-journal-title><![CDATA[Ing. Investig.]]></abbrev-journal-title>
<issn>0120-5609</issn>
<publisher>
<publisher-name><![CDATA[Facultad de Ingeniería, Universidad Nacional de Colombia.]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S0120-56092015000100014</article-id>
<article-id pub-id-type="doi">10.15446/ing.investig.v35n1.44323</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Basic definitions for discrete modeling of computer worms epidemics]]></article-title>
<article-title xml:lang="es"><![CDATA[Definiciones básicas para el modelado discreto de epidemias por gusanos informáticos]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Guevara]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Delgado]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
<xref ref-type="aff" rid="A02"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Audelo]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<xref ref-type="aff" rid="A03"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Valdez]]></surname>
<given-names><![CDATA[J. S]]></given-names>
</name>
<xref ref-type="aff" rid="A04"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Pérez]]></surname>
<given-names><![CDATA[H. M]]></given-names>
</name>
<xref ref-type="aff" rid="A05"/>
</contrib>
</contrib-group>
<aff id="A01">
<institution><![CDATA[,Real-Time Mechanical and Electrical Engineering school, Instituto Politécnico Nacional  ]]></institution>
<addr-line><![CDATA[México D. F]]></addr-line>
</aff>
<aff id="A02">
<institution><![CDATA[,Mechanical and Electrical Engineering school, Instituto Politécnico Nacional  ]]></institution>
<addr-line><![CDATA[ D. F]]></addr-line>
<country>México</country>
</aff>
<aff id="A03">
<institution><![CDATA[,Mechanical and Electrical Engineering school, Instituto Politécnico Nacional  ]]></institution>
<addr-line><![CDATA[ D. F]]></addr-line>
<country>México</country>
</aff>
<aff id="A04">
<institution><![CDATA[,Emiliano Zapata Technological University  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>México</country>
</aff>
<aff id="A05">
<institution><![CDATA[,Mechanical and Electrical Engineering school, Instituto Politécnico Nacional  ]]></institution>
<addr-line><![CDATA[ D. F]]></addr-line>
<country>México</country>
</aff>
<pub-date pub-type="pub">
<day>01</day>
<month>04</month>
<year>2015</year>
</pub-date>
<pub-date pub-type="epub">
<day>01</day>
<month>04</month>
<year>2015</year>
</pub-date>
<volume>35</volume>
<numero>1</numero>
<fpage>79</fpage>
<lpage>85</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_arttext&amp;pid=S0120-56092015000100014&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_abstract&amp;pid=S0120-56092015000100014&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_pdf&amp;pid=S0120-56092015000100014&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[The information technologies have evolved in such a way that communication between computers or hosts has become common, so much that the worldwide organization (governments and corporations) depends on it; what could happen if these computers stop working for a long time is catastrophic. Unfortunately, networks are attacked by malware such as viruses and worms that could collapse the system. This has served as motivation for the formal study of computer worms and epidemics to develop strategies for prevention and protection; this is why in this paper, before analyzing epidemiological models, a set of formal definitions based on set theory and functions is proposed for describing 21 concepts used in the study of worms. These definitions provide a basis for future qualitative research on the behavior of computer worms, and quantitative for the study of their epidemiological models.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[Las tecnologías de la información han evolucionado de tal manera que la comunicación entre computadoras o hosts se ha vuelto algo común, hasta el punto que la organización a nivel mundial (gobiernos y grandes empresas) depende de esto; lo que pasaría si estas computadoras dejaran de funcionar por un periodo de tiempo largo es catastrófico. Desgraciadamente, las redes de hosts son blanco de ataques por malware como virus y gusanos informáticos que podrían colapsar el sistema. Esto ha servido como motivación para el estudio formal de los gusanos informáticos y sus epidemias con el fin de idear estrategias de prevención y protección; por ello en el presente artículo, y previo al análisis de modelos epidemiológicos, se proponen un conjunto de definiciones formales basadas en la teoría de conjuntos y funciones que permiten describir 21 conceptos utilizados en el estudio de los gusanos informáticos. Estas definiciones servirán de base para futuras investigaciones cualitativas sobre el comportamiento de los gusanos informáticos, y cuantitativas para el estudio de sus modelos epidemiológicos.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Epidemic]]></kwd>
<kwd lng="en"><![CDATA[computer worm]]></kwd>
<kwd lng="en"><![CDATA[basic definitions]]></kwd>
<kwd lng="en"><![CDATA[hosts]]></kwd>
<kwd lng="en"><![CDATA[network]]></kwd>
<kwd lng="en"><![CDATA[state]]></kwd>
<kwd lng="es"><![CDATA[Epidemia]]></kwd>
<kwd lng="es"><![CDATA[gusano informático]]></kwd>
<kwd lng="es"><![CDATA[definiciones básicas]]></kwd>
<kwd lng="es"><![CDATA[red de computadoras]]></kwd>
<kwd lng="es"><![CDATA[estado]]></kwd>
</kwd-group>
</article-meta>
</front><body><![CDATA[  <font size="2" face="verdana">     <p>DOI: <a href="http://dx.doi.org/10.15446/ing.investig.v35n1.44323" target="_blank">http://dx.doi.org/10.15446/ing.investig.v35n1.44323</a></p>     <p>    <center> <font size="4"><b>Basic definitions for discrete modeling of computer   worms epidemics</b></font> </center></p>     <p>    <center> <font size="3"><b>Definiciones b&aacute;sicas para el modelado discreto de epidemias por   gusanos inform&aacute;ticos</b></font> </center></p>     <p>P. Guevara<sup>1</sup>, G. Delgado<sup>2</sup>, J. Audelo<sup>3</sup>, J. S. Valdez<sup>4</sup> and H. M. P&eacute;rez<sup>5</sup></p>     <p><sup>1</sup>Pedro Guevara L&oacute;pez. Ph. D. in Computer Science, Instituto Polit&eacute;cnico Nacional, M&eacute;xico D. F. Affiliation: Titular Professor, Real-Time Mechanical and Electrical Engineering school, Instituto Polit&eacute;cnico Nacional, M&eacute;xico D. F.  E-mail: <a href="mailto:pguevara@ipn.mx">pguevara@ipn.mx</a></p>     <p><sup>2</sup>Gustavo Delgado Reyes. Doctoral Student in Communications and Electronics, M. Sc. Microelectronics, Instituto Polit&eacute;cnico Nacional, M&eacute;xico D. F. Affiliation: Mechanical and Electrical Engineering school, Instituto Polit&eacute;cnico Nacional, M&eacute;xico D. F.   E-mail: <a href="mailto:dengue_mgs4@hotmail.com">dengue_mgs4@hotmail.com</a></p>     <p><sup>3</sup>Jes&uacute;s Audelo Gonz&aacute;lez. Ph. D. in Communications and Electronics, M. Sc. in Microelectronics, Instituto Polit&eacute;cnico Nacional, M&eacute;xico D. F. Affiliation: Mechanical and Electrical Engineering school, Instituto Polit&eacute;cnico Nacional, M&eacute;xico D. F.   E-mail: <a href="mailto:jaudelo@ipn.mx">jaudelo@ipn.mx</a></p>     ]]></body>
<body><![CDATA[<p><sup>4</sup>Jorge Salvador Valdez Mart&iacute;nez. Doctoral Student in Communications and Electronics, Instituto Polit&eacute;cnico Nacional, M&eacute;xico D. F. Affiliation: Professor, Industrial Mechanic Academic Department, Emiliano Zapata Technological University, M&eacute;xico.   E-mail: <a href="mailto:jorgevaldez@utez.edu.mx">jorgevaldez@utez.edu.mx</a></p>     <p><sup>5</sup>Hector Manuel P&eacute;rez Meana. Ph. D. in Electrical Engineering from Tokyo Institute of Technology, Tokyo, Japan. Affiliation: Titular Professor, Microelectronics, Mechanical and Electrical Engineering school, Instituto Polit&eacute;cnico Nacional, M&eacute;xico D. F.   E-mail: <a href="mailto:hmperzm@ipn.mx">hmperzm@ipn.mx</a></p> <hr>      <p><b>How to cite: </b>Guevara, P., Delgado, G., Audelo, J., Valdez, J. S., &amp; P&eacute;rez, H. M. (2015). Basic definitions for discrete modeling of computer worms epidemics. <i>Ingenier&iacute;a e Investigaci&oacute;n</i>, <i>35</i>(1), 79-85. DOI: <a href="http://dx.doi.org/10.15446/ing.investig.v35n1.44323" target="_blank">http://dx.doi.org/10.15446/ing.investig.v35n1.44323</a></p> <hr>     <p><b>ABSTRACT</b></p>     <p>The information technologies have evolved in such a way that communication between computers or hosts has become common, so much that the worldwide organization (governments and corporations) depends on it; what could happen if these computers stop working for a long time is catastrophic. Unfortunately, networks are attacked by malware such as viruses and worms that could collapse the system. This has served as motivation for the formal study of computer worms and epidemics to develop strategies for prevention and protection; this is why in this paper, before analyzing epidemiological models, a set of formal definitions based on set theory and functions is proposed for describing 21 concepts used in the study of worms. These definitions provide a basis for future qualitative research on the behavior of computer worms, and quantitative for the study of their epidemiological models.</p>     <p><b> Keywords:</b> Epidemic, computer worm, basic definitions, hosts, network, state.</p> <hr>     <p><b>RESUMEN</b></p>     <p>Las tecnolog&iacute;as de la informaci&oacute;n han evolucionado de tal manera que la comunicaci&oacute;n entre computadoras o <i>hosts</i> se ha vuelto algo com&uacute;n, hasta el punto que la organizaci&oacute;n a nivel mundial (gobiernos y grandes empresas) depende de esto; lo que pasar&iacute;a si estas computadoras dejaran de funcionar por un periodo de tiempo largo es catastr&oacute;fico. Desgraciadamente, las redes de <i>hosts</i> son blanco de ataques por <i>malware</i> como virus y gusanos inform&aacute;ticos que podr&iacute;an colapsar el sistema. Esto ha servido como motivaci&oacute;n para el estudio formal de los gusanos inform&aacute;ticos y sus epidemias con el fin de idear estrategias de prevenci&oacute;n y protecci&oacute;n; por ello en el presente art&iacute;culo, y previo al an&aacute;lisis de modelos epidemiol&oacute;gicos, se proponen un conjunto de definiciones formales basadas en la teor&iacute;a de conjuntos y funciones que permiten describir 21 conceptos utilizados en el estudio de los gusanos inform&aacute;ticos. Estas definiciones servir&aacute;n de base para futuras investigaciones cualitativas sobre el comportamiento de los gusanos inform&aacute;ticos, y cuantitativas para el estudio de sus modelos epidemiol&oacute;gicos.</p>     <p><b> Palabras clave:</b> Epidemia, gusano inform&aacute;tico, definiciones b&aacute;sicas, red de computadoras, estado.</p> <hr>     <p><b>Received:</b> July 8th 2014 <b>Accepted:</b> November 4th 2014</p> <hr>     ]]></body>
<body><![CDATA[<p><font size="3"><b>Introduction</b></font></p>     <p>According to (Audelo <i>et al.</i>, 2013), the origin of computer worms can be traced back to 1979, when scientists in XEROX PARC laboratories found that their equipment did not turn on, restart or collapsed the system. John Shich and Dave Boggs wanted to observe the traffic behavior patterns on networks under certain workloads. They realized that results would not be real enough due to the lack of data traffic, so they developed a program to simulate a high workload, which resulted in the first computer worm prototype. The first recorded computer worm was created by Robert Tappan Morris, a student at Cornell University, in 1988. Apparently, the intention of his program was not malicious, but it dispersed with such speed that approximately 60,000 UNIX systems collapsed (15% of the Internet) (Erbschloe, 2005).</p>     <p>According to (Audelo <i>et al.</i>, 2013; Erbschloe, 2005), a computer worm is a malicious code (malware) with the ability to spread itself when using operating system processes that are generally invisible to the user. A worm does not change file systems, but rather resides in memory and replicates itself, often causing problems to the network (e.g., using the bandwidth available or system resources until tasks are slow or not executable). Another important feature is its capability to spread in a network; worms are able to send copies of themselves between network terminals without the user intervention.</p>     <p>Since the first computer worms appeared, they have caused extensive damage to government institutions, universities and companies, generating numerous economic losses (Audelo <i>et al.</i>, 2013). Recent technological advancement has allowed the development of worms that are increasingly more difficult to counter-attack, hence the importance of modeling the dynamics of spread using epidemiological models to generate new techniques and tools to counter-attack in a fast and effective way (Nazario, 2004). <a href="#f1">Figure 1</a> shows a flowchart with computer worm action, from a host in a network to epidemic.</p>     <p>    <center><a name="f1"></a><img src="img/revistas/iei/v35n1/v35n1a14f1.jpg"></center></p>     <p>Most known computer worms are spread in one of the following ways: via files sent as email attachments, via a link to a web or FTP resource; via a link sent in an ICQ or IRC message; via P2P (peer-to-peer) file sharing networks; and some worms are spread as network packets. Computer worms can exploit network configuration errors (for example, copy themselves onto a fully accessible disk) or exploit loopholes in operating system and application security. Many worms will use more than one method in order to spread copies via networks (Kaspersky labs, 2014). In this sense, future worm epidemics might spread at unprecedented rates in high-speed networks (Chen &amp; Robert, 2004). A comprehensive automated defense system will be the only way to contain new threats but could be too risky to implement without more reliable detection accuracy and better real-time traffic analysis.</p>     <p>In this paper we propose a set of formal definitions based on set theory, and functions are proposed for describing 21 concepts used in the study of computer worms. These definitions provide a basis for future qualitative research on the behavior of computer worms and quantitative for the study of their epidemiological models.</p>     <p><font size="3"><b>Commonly used concepts in modeling computer worms epidemics</b></font></p>     <p>Computer worms have the capability to spread themselves without any intervention from the user. This feature allows an analogy with biological diseases. Mathematical models based on Kermack-Mckendrick (Kermack-Mckendrick, 1927) can be used to describe the dynamic behavior of the disease spread. These models can also describe the spread behavior of computer worms. Usually, they are referred as dynamic systems represented by differential equations; for example, in the cases shown in (Changchun <i>et al.</i>, 2002; Yang-Chenxi, 2003; Tao <i>et al.</i>, 2007; Onwubiko <i>et al.</i>, 2005; Juan <i>et al.</i>, 2010; Hincapi&eacute;-Ospina, 2007; Tassier, 2005) they are used to represent <i>SI</i>, <i>SIR</i> and <i>SIRS</i> models (Hincapi&eacute;-Ospina, 2007). However, before considering the dynamic modeling, it is necessary to explain commonly used concepts in specialized literature.</p>     ]]></body>
<body><![CDATA[<p><b>Host:</b> A computer whose programs access another computer through a network (Downing <i>et al.</i>, 2009).</p>     <p><b>Network:</b> A system of computers, and often peripherals like printers, that are interconnected (Downing <i>et al.</i>, 2009). See <a href="#f2">Figure 2</a>.</p>     <p>    <center><a name="f2"></a><img src="img/revistas/iei/v35n1/v35n1a14f2.jpg"></center></p>     <p><b>Network Topology:</b> The communication link used by the nodes in a network for communication (Downing et <i>al.</i>, 2009). Network topologies, shown in <a href="#f2">Figure 2</a>, are classified according to the network architecture, or how they interconnect the different nodes or users on the network.</p>     <p><b>Malicious Code (Malware):</b> Malicious software with the main goal to infiltrate, damage or make use of a computer resources without the owner's consent, according to (Sabin, 2011). In the information field, technology malware is also often referred to as hostile, intrusive or annoying.</p>     <p><b>Computer Worm:</b> According to (Cohen, 1992), a computer worm is a program, whose main feature is the capability to self propagate through a data network without the need of explicit participation of any user. Once it is released by its creator, the code is designed to propagate autonomously, allowing it to exploit failures in the network administration politics and vulnerabilities of their services, and depending on the purpose for which the worm was designed, using the operating system processes automatic and invisible for the user, so they are not easily detected. However the damage caused by worms is perceptible, causing great instability of the systems.</p>     <p><b>Epidemiology:</b> The study of the general laws of infectious diseases distribution (including characteristics of the infection source, the transmission mechanism, the susceptibility to infection, etc.) and the general principles of prevention and control of disease (Changchun <i>et al</i>., 2002; Kephart <i>et al</i>., 1993).</p>     <p><b>Epidemiological State:</b> Classical epidemiological models consider three states (Kermack-Mckendrick, 1927; Hincapi&eacute;-Ospina, 2007): susceptible state S, infectious state I and removed or recovered state R.</p>     <p><b>Susceptible State (S):</b> For individuals who have no immunity against the infectious agent.</p>     ]]></body>
<body><![CDATA[<p><b>Infectious State (I):</b> For individuals already infected who can transmit the infection to susceptible individuals.</p>     <p><b>Removed or Recovered State (R):</b> For individuals who are already immune to infection, and therefore do not affect the dynamics of the transmission in any way, even when they enter in contact with other individuals.</p>     <p><b>Updates:</b> Programs whose main objective is to repair flaws for the vulnerabilities in the first versions of operating systems. In some applications, there are also updates with new features for the operating system (Microsoft, 2013).</p>     <p><b>Patches:</b> Programs that contain applicable changes for a program, usually security fixes for bugs. They may increase the functions in applications or change the defined language of a program (Downing <i>et al.</i>, 2009; Sabin, 2011).</p>     <p><b>Antivirus Software:</b> To prevent some programs or applications classified as harmful for the system, there are programs that must be installed in operating systems. They run in the background to detect programs, and notify the user when they block, delete or contain malware (Downing <i>et al.</i>, 2009; Sabin, 2011).</p>     <p>The next section presents a set of formal definitions based on discrete mathematics involving concepts related to computer worms.</p>     <p>These definitions will be used to analyze classical models as <i>SI</i>, <i>SIR</i> and <i>SIRS, </i>which in fact are mathematical models to describe the dynamic behavior of epidemics and propose new models of epidemics by worms, considering that the cardinality of hosts sets is integer and not fractional.</p>     <p><font size="3"><b>Basic definitions for computer worms   epidemic modeling</b></font></p>     <p>This section will define the set of basic concepts employed in the epidemiological models based in approximations. It also presents the worm environment and the definitions of each element involved in the epidemiological process: host, network, worm, vaccine, update, downgrade, set of susceptible hosts, set of infected hosts and set of removed hosts.</p>     <p><b>Definition 1 (Host). </b>Every host <i>h<sub>i,k</sub></i> is a triad compound for a computer <i>o<sub>i</sub></i>, an state <i>E<sub>i,k</sub></i> and a set of computers neighboring next to <i>V<sub>i</sub></i> to <i>o<sub>i</sub></i>; this is:</p>     ]]></body>
<body><![CDATA[<p>    <center><img src="img/revistas/iei/v35n1/v35n1a14e1.jpg"></center></p>     <p>where <i>i, k</i> &isin; <b>N</b><sup>+</sup> are the index that identifies the host and the index of evolution, respectively. Thus a host is a computer whose programs access other computers through a network and can have several states and several computer neighbors. An example of a host can be a computer connected to a network with an operating system like Windows&reg; or Mac&reg;, vulnerable to attacks. In the case of <a href="#f2">Figure 2</a>, it can be any of the nodes shown.</p>     <p><b>Definition 2 (Network). </b>Every network <i>N </i>is a set of <i>n </i>hosts:</p>     <p>    <center><img src="img/revistas/iei/v35n1/v35n1a14e2.jpg"></center></p>     <p>And a set of <i>m</i> connections between hosts:</p>     <p>    <center><img src="img/revistas/iei/v35n1/v35n1a14e3.jpg"></center></p>     <p>Such as it may be represented by a graph:</p>     ]]></body>
<body><![CDATA[<p>    <center><img src="img/revistas/iei/v35n1/v35n1a14e4.jpg"></center></p>     <p>In this sense, every network host is a set of hosts where each one is connected by a physical medium and a protocol with at least another host. Hosts can be connected by WIFI, Ethernet, coaxial or even Bluetooth. An example of a network can be a set of interconnected computers on a corporate office or cyber site.</p>     <p><b>Definition 3 (Network Topology). </b>Every topology <i>T </i>of a network <i>N</i> is defined by the arrangement between a set of hosts <i>H</i> and a set of connections <i>C</i>; it describes the shape of way between hosts <i>h<sub>i,k</sub></i>and <i>h<sub>j,k</sub></i> with <i>i &ne; j </i>and<i> i, j, k</i> &isin; N<sup>+</sup></p>     <p>Every Network Topology is an orderly array of a host set, independently of the medium or protocol used. For example, a star topology is present on a cyber site with several hosts connected to a single access point. See <a href="#f3">figure 3</a>.</p>     <p>    <center><a name="f3"></a><img src="img/revistas/iei/v35n1/v35n1a14f3.jpg"></center></p>     <p><b>Definition 4 (Host State).</b> The state <i>E<sub>i,k</sub></i>of a host <i>h<sub>i,k</sub></i> is defined as the situation that has a host and it is described by:</p>     <p>    <center><img src="img/revistas/iei/v35n1/v35n1a14e5.jpg"></center></p>     ]]></body>
<body><![CDATA[<p>with:</p>     <p>    <center><img src="img/revistas/iei/v35n1/v35n1a14e6.jpg"></center></p>     <p>Where the classic epidemiological models of a worm <i>X</i> is given by:</p>     <p>    <center><img src="img/revistas/iei/v35n1/v35n1a14e7.jpg"></center></p>     <p>where <b><i>S </i></b>is the susceptible state, <b><i>I </i></b>is the infectious state and <b><i>R </i></b>is the removed or recovered state. Here <b><i>I</i></b>denotes a host infected by a computer worm and <b><i>R </i></b>the state of a host after the worm is removed.</p>     <p>An example of this definition is a PC with Microsoft Windows&reg; without any antivirus installed, and therefore vulnerable to an attack by malware; hence, its state is susceptible <b><i>S</i></b>.</p>     <p><b>Definition 5 (Susceptible State).</b> Every host <i>h<sub>i,k</sub></i> is in a susceptible state <b><i>S </i></b>if and only if it can change its status to infectious state <b><i>I </i></b>or to removed or recovered state <b><i>R </i></b>in <i>h<sub>i,k</sub></i>. See <a href="#f4">figure 4</a>.</p>     <p>    ]]></body>
<body><![CDATA[<center><a name="f4"></a><img src="img/revistas/iei/v35n1/v35n1a14f4.jpg"></center></p>     <p>This is a first state in a host; in this condition, a host is vulnerable to any computer worm or state code. In the example of definition 4 it was explained that the state of a Windows&reg; PC without an antivirus is always susceptible, as a consequence it will be exposed to a virus or computer worm attacks.</p>     <p><b>Definition 6 (Infectious State).</b> Every host <i>h<sub>i,k</sub></i>is in infectious state <b><i>I </i></b>if and only if it can change its status to removed or recovered state <b><i>R</i></b> in <i>h<sub>i,k</sub></i><i>. </i>See <a href="#f5">figure 5</a>.</p>     <p>    <center><a name="f5"></a><img src="img/revistas/iei/v35n1/v35n1a14f5.jpg"></center></p>      <p>The Infectious state is result of action by a computer worm in a susceptible host. As an example of an infected host is a Windows&reg; computer without antivirus and connected to a network, which has been attacked by the worm <i>Sasser </i>or <i>I love you</i>.</p>     <p><b>Definition 7 (Removed or Recovered State). </b>Every host <i>h<sub>i,k</sub></i> is in removed or recovered state <b><i>R</i></b>, if and only if it can change its status to susceptible state <b><i>S</i></b> or to isolated state <b><i>A</i></b> in <i>h<sub>i,k</sub></i>. See <a href="#f6">figure 6</a>.</p>     <p>    <center><a name="f6"></a><img src="img/revistas/iei/v35n1/v35n1a14f6.jpg"></center></p>     <p>The recovered state is result of action by a vaccine in a infected host, in this sense considering the example in the previous definition, the infected computer by <i>Sasser </i>or <i>I love you</i> will be in removed state or recovered if it is applied correctly vaccine using McAfee&reg;, Norton&reg; or Kaspersky&reg;.</p>     ]]></body>
<body><![CDATA[<p><b>Definition 8 (Isolated State). </b>Every host <i>h<sub>i,k</sub></i> is in isolated state <b><i>A</i></b> if and only if it cannot change its status to any other state in <i>h<sub>i,k</sub></i>.</p>     <p>The isolated state is result of action by a patch in a removed or recovered host. An example is a recovered computer by the action of an antivirus which was updated or patched, for example Windows&reg; Service Pack 3.    <br>  <b>Definition 9 (Set of Susceptible Hosts). </b>Every set <img src="img/revistas/iei/v35n1/v35n1a14ep1.jpg" align="absmiddle"> of susceptible hosts in a network <i>N</i> is defined by the hosts set <i>h<sub>i,k</sub></i> with state <b><i>S</i></b> in the index of evolution <i>k</i><i>, </i>this is:</p>     <p>    <center><img src="img/revistas/iei/v35n1/v35n1a14e8.jpg"></center></p>     <p>Every network without action of a vaccine is vulnerable or susceptible to a computer worm action. If one or more hosts are infected, then they can infect all susceptible hosts. An example of this is a set of computers in a cyber site without any antivirus installed.     <br>  <b>Definition 10 (Set of Infected Hosts).</b> Every set <img src="img/revistas/iei/v35n1/v35n1a14ep2.jpg" align="absmiddle"> of infected hosts in a network <i>N </i>is defined by the set of hosts <i>h<sub>i,k</sub></i> with state <b><i>I </i></b>in the index of evolution <i>k,</i> this is:</p>     <p>    <center><img src="img/revistas/iei/v35n1/v35n1a14e9.jpg"></center></p>     <p>This set is the cardinality or number of elements infected by a computer worm action into a network. An example of this is a computers set in a cyber site affected by a computer worm.</p>     ]]></body>
<body><![CDATA[<p><b>Definition 11 (Set of Removed or Recovered Hosts).</b> Every set <img src="img/revistas/iei/v35n1/v35n1a14ep3.jpg" align="absmiddle"> of removed or recovered hosts in a network <i>N </i>is defined by the set of hosts <i>h<sub>i,k</sub></i>with state <b><i>R </i></b>in the index of evolution <i>k,</i> this is:</p>     <p>    <center><img src="img/revistas/iei/v35n1/v35n1a14e10.jpg"></center></p>     <p>This set is the cardinality or number of elements recovered by action of a vaccine into a network host. An example of this is a set of computers in a cyber site to which a vaccine has been applied.     <br>  <b>Definition 12 (Set of Isolated Hosts).</b> Every set <img src="img/revistas/iei/v35n1/v35n1a14ep4.jpg" align="absmiddle"> of isolated hosts in a network <i>N</i> is defined by the set of hosts <i>h<sub>i,k</sub></i> with state <b><i>A </i></b>in the index of evolution <i>k,</i> this is:</p>     <p>    <center><img src="img/revistas/iei/v35n1/v35n1a14e11.jpg"></center></p>     <p>This set is the cardinality or number of elements isolated to computer worm action into a network. The isolated action is obtained by patch or upgrade software. An example of this is a set of computers in a cyber site with an updated operating system or a patch.</p>     <p><b>Definition 13 (State Code). </b>Every state code is such when its action <i>e</i> changes the state <b><i>X</i></b> of a host <i>h<sub>i,k</sub></i> to the state <b><i>Y </i></b>such as <b><i>X</i></b><b>,<i>Y </i></b>&isin;{<b><i>S, I, R, A</i></b>} in the index <i>k+</i>1 in a time interval <i>&tau;</i>, which is the speed of action of the state code expressed in <i>card </i>(<i>affected-host</i>)/<i>second, </i>and &Delta;<i>t</i> is the size of the sampling interval in seconds. This is:</p>     <p>    ]]></body>
<body><![CDATA[<center><img src="img/revistas/iei/v35n1/v35n1a14e12.jpg"></center></p>     <p>in time <i>&tau;</i>&Delta;<i>t</i>.</p>     <p>An example of state code can be a computer worm, vaccine, update, downgrade or virus; it may be any software that changes the state of a host.</p>     <p><b>Definition 14 (Malicious code).</b> Every malicious code is such when its action <i>m</i> changes the susceptible state <b><i>S</i></b> of a host <i>h<sub>i,k</sub></i> to the infectious state <b><i>I </i></b>in the index <i>k+</i>1 in a time interval <i>&beta;</i>&Delta;<i>t</i> where <i>b</i>is the speed of action of the malicious. This is:</p>     <p>    <center><img src="img/revistas/iei/v35n1/v35n1a14e13.jpg"></center></p>     <p>in time <i>&beta;</i>&Delta;<i>t</i>.</p>     <p>Examples of malicious codes are worms, viruses, trojans, spyware, etc.: any code that changes the state of a host to infected.</p>     <p><b>Definition 15 (Computer Worm).</b> Every computer worm is a malicious code when its action <i>&omega;</i> changes the susceptible state <b><i>S</i></b> of a host <i>h<sub>i,k</sub></i> to the infectious state <b><i>I </i></b>in <i>k+</i>1 and changes the susceptible state <b><i>S</i></b> of a host <i>h</i><sub><i>i,k</i>+1</sub> (immediate neighbor of <i>h</i><sub><i>i,k</i>+1</sub>) to the infectious state <b><i>I</i></b> in <i>k+</i>2. This is:</p>     <p>    ]]></body>
<body><![CDATA[<center><img src="img/revistas/iei/v35n1/v35n1a14e14.jpg"></center></p>     <p>in a time interval <i>&beta;</i>&Delta;<i>t </i>such as:</p>     <p>    <center><img src="img/revistas/iei/v35n1/v35n1a14e15.jpg"></center></p>     <p>in a time interval 2<i>&beta;</i>&Delta;<i>t </i>with <i>h</i><sub><i>j,k</i>+1</sub> immediate neighbor of <i>h</i><sub><i>i,k</i>+1</sub> with <i>&beta;</i> as the speed of action and propagation of the worm.</p>     <p>Every worm is a malicious code (malware) that attacks any host in order to change its state to infected; worms spread from host to host in a network without human action. Examples of computer worms are: <i>I Love You</i>, <i>Melissa</i>, <i>Sasser</i>, <i>Blaster</i>, etc.</p>     <p><b>Definition 16 (Vaccine).</b> Every vaccine is a state code, and its action <i>v</i> changes to the infectious state <b><i>I </i></b>of a host <i>h<sub>i,k</sub></i> to the removed or recovered state <b><i>R</i></b> in the index <i>k+</i>1 in a time interval <i>&gamma;</i>&Delta;<i>t </i>where <i>g</i> is the speed action of the vaccine. This is:</p>     <p>    <center><img src="img/revistas/iei/v35n1/v35n1a14e16.jpg"></center></p>     <p>in the time <i>&gamma;</i>&Delta;<i>t</i>.</p>     ]]></body>
<body><![CDATA[<p>Vaccines are state codes with the capability of changing the state of a host to recovery. Examples of vaccines are: Panda&reg;, Kaspersky&reg;, McAfee&reg;, Avast&reg;, etc.</p>     <p><b>Definition 17 (Update). </b>Every update is such when its action <i>a</i> changes the susceptible state <b><i>S</i></b> of a host <i>h<sub>i,k</sub></i> to the removed or recovered state <b><i>R</i></b> in the index <i>k+</i>1 in a time interval <i>&sigma;</i>&Delta;<i>t </i>where <i>&sigma;</i> is the speed action of the update. This is:</p>     <p>    <center><img src="img/revistas/iei/v35n1/v35n1a14e17.jpg"></center></p>     <p>in the time <i>&sigma;</i>&Delta;<i>t</i>.</p>     <p>The updates are software modules that protect hosts before computer worms or another malware changes their states to infected. Usually, operating systems like Microsoft Windows&reg; or Apple OS&reg; release updates periodically. An example of this is the update from MacOS IX&reg; to MacOSX&reg;, or Windows7&reg; to Windows 8&reg;, and it is important to mention that in each update new safety standards are added.</p>     <p><b>Definition 18 (Downgrade). </b>Every downgrade is such when its action <i>d </i>changes the removed or recovered state <b><i>R </i></b>of a host <i>h<sub>i,k</sub></i> to the susceptible state <b><i>S</i></b> in the index <i>k+</i>1 in a time interval <i>&alpha;</i>&Delta;<i>t </i>where <i>&alpha;</i> is the speed action of downgrade. This is:</p>     <p>    <center><img src="img/revistas/iei/v35n1/v35n1a14e18.jpg"></center></p>     <p>in time <i>&alpha;</i>&Delta;<i>t</i>.</p>     ]]></body>
<body><![CDATA[<p>Downgrade refers to reverting software back to an older version; downgrade is the opposite of upgrade. The disadvantage of this action is that it keeps hosts in state susceptible to computer worms. An example of this is the migration from MacOS X&reg; to MacOS IX&reg; orWindows8&reg; to Windows 7&reg;; its purpose is to ensure compatibility with older software.</p>     <p><b>Definition 19 (Patch). </b>Every patch is a state code, and its action <i>p</i> changes the removed or recovered state <b><i>R </i></b>of a host <i>h<sub>i,k</sub> </i>to the isolated state <b><i>A </i></b>in the index <i>k+</i>1 in a time interval <i>&delta;</i>&Delta;<i>t</i> where <i>&delta;</i> is the speed action of patch. This is:</p>     <p>    <center><img src="img/revistas/iei/v35n1/v35n1a14e19.jpg"></center></p>     <p>in the time <i>&delta;</i>&Delta;<i>t</i>.</p>     <p>A patch is a piece of software designed to update a computer program or its supporting data, to fix or improve it. This includes fixing security vulnerabilities isolating hosts. An example of this is the update for service pack in Microsoft Windows&reg;.</p>     <p>    <center><a name="f7"></a><img src="img/revistas/iei/v35n1/v35n1a14f7.jpg"></center></p>     <p><b>Definition 20 (Root host). </b>In a network <b><i>N</i></b>, the root host <i>h</i><sub>1,1</sub> is the first host affected by an action of the worm such that:</p>     <p>    ]]></body>
<body><![CDATA[<center><img src="img/revistas/iei/v35n1/v35n1a14e20.jpg"></center></p>     <p>in the time interval <i>&beta;</i>&Delta;<i>t </i>such as:</p>     <p>    <center><img src="img/revistas/iei/v35n1/v35n1a14e21.jpg"></center></p>     <p>in a time interval 2<i>&beta;</i>&Delta;<i>t</i> with <i>h</i><sub><i>j</i>,2</sub> immediate neighbor of <i>h</i><sub><i>i</i>,2</sub>.</p>     <p>In a practical case, the root host is the first infected host, the host where the infection starts. An example of this is the first computer infected at a cyber site due to the insertion of a USB stick with a computer worm.</p>     <p><b>Definition 21 (Epidemic). </b>In a network <b><i>N</i></b>, an epidemic is defined as the change of the states <i>E<sub>i,k</sub></i> of the nodes <i>h<sub>i,k</sub> </i>of <b><i>S </i></b>to <b><i>I </i></b>from the root host <i>h</i><sub>1,1</sub> due to the action <i>&omega;</i>(<i>h</i><sub>1,1</sub>) of a worm, following the pattern of propagation in accordance to the topology <b><i>T</i></b> of the host network <b><i>N</i></b>.</p>     <p>Finally, an epidemic is the rapid spread of a computer worm to a large number of susceptible hosts set in a known interval of time. Based on the example of the previous definition, <i>epidemic </i>is the spread of computer worm content on USB memory for all computers that have not been vaccinated in the cyber site.</p>     <p><font size="3"><b>Conclusions</b></font></p>     <p>In this paper, we presented a brief history of computer worms, malware with the capability to self propagate across network and a set of concepts involved. The theory of epidemics by computer worms and these concepts are expressed verbally without any formal notation, which is not useful for mathematical models and simulations. This paper presented 17 formal definitions based on discrete mathematics involving concepts related to computer worms. An additional contribution to computer worm theory is the definition of isolated state <i>A</i> of a host, or a host with a unique state that cannot be affected by the computer worm.</p>     ]]></body>
<body><![CDATA[<p>The 21 definitions developed in this work provide a theoretical foundation that serves as a basis for mathematical modelling of computer worms spread, which, when implemented on computers, can help to prevent the computer worms spread; this is explained in (Guevara <i>et al.</i>, 2014) where the creation and implementation of computational algorithms that relate the variables involved in the developed formal definitions is described. This constitutes one of the main contributions of this work, since the existing mathematical models to describe the dynamic behaviour of the spread of computer worms lack these.</p> <hr>     <p><font size="3"><b>References</b></font></p>     <!-- ref --><p>Audelo, J., Casta&ntilde;eda, A., &amp; Guevara, P. (2013). Gusanos Inform&aacute;ticos: de los inicios a su primer impacto en los gobiernos. <i>Revista Aleph Zero</i>, <i>17</i>(64), 22-25. Retrieved February 20, 2013 from <a href="http://www.comprendamos.org/az/alephzero/aleph64.pdf" target="_blank">http://www.comprendamos.org/az/alephzero/aleph64.pdf</a>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000165&pid=S0120-5609201500010001400001&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p>Changchun, C., Gong, W., &amp; Towsley, D. (2002). Code red worm propagation modelling and analysis. In <i>Proceedings of CCS'02</i>, (pp. 1-10). Retrieved February 20, 2013 from <a href="http://www.unix.ecs.umass.edu/~gong/papers/codered.pd" target="_blank">http://www.unix.ecs.umass.edu/~gong/papers/codered.pd</a>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000166&pid=S0120-5609201500010001400002&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p>Chen, T. M., &amp; Robert, J. M. (2004). Worm epidemics in high-speed networks. In <i>IEEE Computer</i> (pp. 48-53). Retrieved October 2014 from: <a href="http://dl.acm.org/citation.cfm?id=998510" target="_blank">http://dl.acm.org/citation.cfm?id=998510</a>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000167&pid=S0120-5609201500010001400003&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p>Cohen, F. (1992). A formal definition of computer worms and some related results. <i>Computers &amp; Security</i>, <i>11</i>(7), 641-652. Retrieved February 20, 2013 from <a href="http://game.all.net/books/tech/wormdef.pdf" target="_blank">http://game.all.net/books/tech/wormdef.pdf</a>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000168&pid=S0120-5609201500010001400004&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p>Downing, D., Covington, M., &amp; Mauldin, M. (2009). Dictionary of computer and internet terms (10th Ed.) (pp. 243, 335). New York: Barron's Educational Series, Inc. Retrieved February 20, 2013 from <a href="http://www.turuz.info/Sozluk/0329-Dictionary%20Computer%20 Internet.Terms.pdf" target="_blank">http://www.turuz.info/Sozluk/0329-Dictionary%20Computer%20 Internet.Terms.pdf</a>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000169&pid=S0120-5609201500010001400005&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p>Erbschloe, M. (2005). Trojans, Worms, and Spyware: A computer security professional's guide to malicious code (1st Ed.) (pp. 33). Massachusetts: Butterworth-Heinemann (Elsevier). Retrieved February 20, 2013 from <a href="http://edc.tversu.ru/elib/inf/0110.pdf" target="_blank">http://edc.tversu.ru/elib/inf/0110.pdf</a>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000170&pid=S0120-5609201500010001400006&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p>Guevara, P., Valdez, J., Audelo, J., &amp; Delgado, G. (2014). Numerical approaching of SI epidemic model for spreading of computer worms, simulation and error analysis. <i>Revista Tecnura</i>, <i>18</i>(42), 12-23. Retrieved December 19, 2014 from <a href="http://tecnura. udistrital.edu.co/ojs/index.php/revista/issue/view/61/showToc" target="_blank">http://tecnura. udistrital.edu.co/ojs/index.php/revista/issue/view/61/showToc</a>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000171&pid=S0120-5609201500010001400007&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p>Hincapi&eacute;, D., &amp; Ospina, J. (2007). Bases para la modelaci&oacute;n de epidemias: el caso del s&iacute;ndrome respiratorio agudo severo en Canad&aacute;. <i>Journal of Public Health</i>, <i>9</i>(1), 117-128. Retrieved February 20, 2013 from <a href="http://redalyc.uaemex.mx/pdf/422/42290111.pdf" target="_blank">http://redalyc.uaemex.mx/pdf/422/42290111.pdf</a>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000172&pid=S0120-5609201500010001400008&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p>Juan, W., Cengyi, X., &amp; Qifeng, L. (2010). A novel model for the internet worm propagation. In Proceedings of VI ICNC 2010 (pp. 2885-2888). Retrieved February 20, 2013 from <a href="http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5584495" target="_blank">http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5584495</a>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000173&pid=S0120-5609201500010001400009&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p>Kaspersky lab (2014). Retrieved October 25, 2014, from <a href="http://usa.kaspersky.com/internet-security-center/threats/viruses-worms" target="_blank">http://usa.kaspersky.com/internet-security-center/threats/viruses-worms</a>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000174&pid=S0120-5609201500010001400010&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p>Kephart, J., &amp; Chess, D. (1993). White Steve, computers and epidemiology. <i>Spectrum IEEE</i>, <i>30</i>(5), 20-26. Retrieved February 20, 2013 from <a href="http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=275061" target="_blank">http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=275061</a>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000175&pid=S0120-5609201500010001400011&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p>Kermack, W. O., &amp; Mckendrick, A. G. (1927). A contribution to the mathematical theory of epidemics. <i>Proceedings of the Royal Society of London Series A</i>, <i>115</i>(772), 700-721. Retrieved February 20, 2013 from <a href="http://www.math.utah.edu/~bkohler/Journalclub/kermack1927.pdf" target="_blank">http://www.math.utah.edu/~bkohler/Journalclub/kermack1927.pdf</a>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000176&pid=S0120-5609201500010001400012&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p>Microsoft TechNet (2013). Retrieved February 20, 2013 from <a href="http://technet.microsoft.com/es-mx/updatemanagement/bb245736.aspx" target="_blank">http://technet.microsoft.com/es-mx/updatemanagement/bb245736.aspx</a>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000177&pid=S0120-5609201500010001400013&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p>Nazario, J. (2004). Defense and detection strategies against internet worms (1st Ed.) (pp. 2-8). Massachusetts: Artech House. Retrieved February 20, 2013 from <a href="http://es.scribd.com/doc/59508754/Defense-and-Detection-Strategies-Against-Internet-Worms-2004#download" target="_blank">http://es.scribd.com/doc/59508754/Defense-and-Detection-Strategies-Against-Internet-Worms-2004#download</a>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000178&pid=S0120-5609201500010001400014&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p>Onwubiko, C., Lenaghan, A. P., &amp; Hebbes, L. (2005). An improved worm mitigation model for evaluating the spread of aggressive network worms. In <i>Proceedings of EUROCON 2005</i> (pp. 1710-1713). Retrieved February 20, 2013 from <a href="http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1630303" target="_blank">http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1630303</a>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000179&pid=S0120-5609201500010001400015&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p>Sabin, W. (2011). Appendix D: Glossary of computer terms (1st ed.) (pp. 16). New York: McGraw-Hill Companies. Retrieved February 20, 2013 from <a href="http://www.mhhe.com/business/buscom/gregg/docs/appd.pdf" target="_blank">http://www.mhhe.com/business/buscom/gregg/docs/appd.pdf</a>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000180&pid=S0120-5609201500010001400016&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p>Tao, L., Zhi-Hong, G., Zhengping, W., &amp; Xianyong, W. (2007). Stability analysis of a delayed model of the spread of worms. In: <i>Proceedings of 2007 IEEE International Conference on Control and Automation</i> (pp. 3188-3190). Retrieved February 20, 2013 from <a href="http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&amp;arnumber=5234704" target="_blank">http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&amp;arnumber=5234704</a>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000181&pid=S0120-5609201500010001400017&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p>Tassier, T. (2005). SIR Model of Epidemics (pp. 1-9). New York: Department of Economics, Fordham University. Retrieved February 20, 2013 from <a href="http://www.fordham.edu/images/Undergraduate/economics/faculty/SIR.pdf" target="_blank">http://www.fordham.edu/images/Undergraduate/economics/faculty/SIR.pdf</a>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000182&pid=S0120-5609201500010001400018&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p>Yang, W., &amp; Chenxi, W. (2003). Modeling the effects of timing parameters on virus propagation. In <i>Proceedings of WORM'03</i> (pp. 1-6). Retrieved February 20, 2013 from <a href="http://www.thehackademy.net/madchat/vxdevl/papers/avers/worm.pdf" target="_blank">http://www.thehackademy.net/madchat/vxdevl/papers/avers/worm.pdf</a>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000183&pid=S0120-5609201500010001400019&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> ]]></body><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Audelo]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Castañeda]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Guevara]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<article-title xml:lang="es"><![CDATA[Gusanos Informáticos: de los inicios a su primer impacto en los gobiernos]]></article-title>
<source><![CDATA[Revista Aleph Zero]]></source>
<year>2013</year>
<volume>17</volume>
<numero>64</numero>
<issue>64</issue>
<page-range>22-25</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Changchun]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Gong]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
<name>
<surname><![CDATA[Towsley]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<source><![CDATA[Code red worm propagation modelling and analysis]]></source>
<year>2002</year>
<conf-name><![CDATA[ Proceedings of CCS'02]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-10</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[T. M]]></given-names>
</name>
<name>
<surname><![CDATA[Robert]]></surname>
<given-names><![CDATA[J. M]]></given-names>
</name>
</person-group>
<source><![CDATA[Worm epidemics in high-speed networks]]></source>
<year>2004</year>
<conf-name><![CDATA[ IEEE Computer]]></conf-name>
<conf-loc> </conf-loc>
<page-range>48-53</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cohen]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A formal definition of computer worms and some related results]]></article-title>
<source><![CDATA[Computers & Security]]></source>
<year>1992</year>
<volume>11</volume>
<numero>7</numero>
<issue>7</issue>
<page-range>641-652</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Downing]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Covington]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Mauldin]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[Dictionary of computer and internet terms]]></source>
<year>2009</year>
<edition>10</edition>
<page-range>243, 335</page-range><publisher-loc><![CDATA[New York ]]></publisher-loc>
<publisher-name><![CDATA[Barron's Educational Series]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Erbschloe]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[Trojans, Worms, and Spyware: A computer security professional's guide to malicious code]]></source>
<year>2005</year>
<edition>1</edition>
<page-range>33</page-range><publisher-loc><![CDATA[^eMassachusetts Massachusetts]]></publisher-loc>
<publisher-name><![CDATA[Butterworth-Heinemann (Elsevier)]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Guevara]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<name>
<surname><![CDATA[Audelo]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Delgado]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Numerical approaching of SI epidemic model for spreading of computer worms, simulation and error analysis]]></article-title>
<source><![CDATA[Revista Tecnura]]></source>
<year>2014</year>
<volume>18</volume>
<numero>42</numero>
<issue>42</issue>
<page-range>12-23</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hincapié]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Ospina]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang="es"><![CDATA[Bases para la modelación de epidemias: el caso del síndrome respiratorio agudo severo en Canadá]]></article-title>
<source><![CDATA[Journal of Public Health]]></source>
<year>2007</year>
<volume>9</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>117-128</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Juan]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
<name>
<surname><![CDATA[Cengyi]]></surname>
<given-names><![CDATA[X]]></given-names>
</name>
<name>
<surname><![CDATA[Qifeng]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<source><![CDATA[A novel model for the internet worm propagation]]></source>
<year>2010</year>
<conf-name><![CDATA[ Proceedings of VI ICNC 2010]]></conf-name>
<conf-loc> </conf-loc>
<page-range>2885-2888</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="">
<collab>Kaspersky lab</collab>
<source><![CDATA[]]></source>
<year>2014</year>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kephart]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Chess]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[White Steve, computers and epidemiology]]></article-title>
<source><![CDATA[Spectrum IEEE]]></source>
<year>1993</year>
<volume>30</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>20-26</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kermack]]></surname>
<given-names><![CDATA[W. O]]></given-names>
</name>
<name>
<surname><![CDATA[Mckendrick]]></surname>
<given-names><![CDATA[A. G]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A contribution to the mathematical theory of epidemic]]></article-title>
<source><![CDATA[Proceedings of the Royal Society of London Series A]]></source>
<year>1927</year>
<volume>115</volume>
<numero>772</numero>
<issue>772</issue>
<page-range>700-721</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="">
<collab>Microsoft TechNet</collab>
<source><![CDATA[]]></source>
<year>2013</year>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nazario]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA[Defense and detection strategies against internet worms]]></source>
<year>2004</year>
<edition>1</edition>
<page-range>2-8</page-range><publisher-loc><![CDATA[^eMassachusetts Massachusetts]]></publisher-loc>
<publisher-name><![CDATA[Artech House]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Onwubiko]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Lenaghan]]></surname>
<given-names><![CDATA[A. P]]></given-names>
</name>
<name>
<surname><![CDATA[Hebbes]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<source><![CDATA[An improved worm mitigation model for evaluating the spread of aggressive network worms]]></source>
<year>2005</year>
<conf-name><![CDATA[ Proceedings of EUROCON 2005]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1710-1713</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sabin]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
</person-group>
<source><![CDATA[Appendix D: Glossary of computer terms]]></source>
<year>2011</year>
<edition>1</edition>
<page-range>16</page-range><publisher-loc><![CDATA[New York ]]></publisher-loc>
<publisher-name><![CDATA[McGraw-Hill Companies]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tao]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Zhi-Hong]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
<name>
<surname><![CDATA[Zhengping]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
<name>
<surname><![CDATA[Xianyong]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
</person-group>
<source><![CDATA[Stability analysis of a delayed model of the spread of worms]]></source>
<year>2007</year>
<conf-name><![CDATA[ Proceedings of 2007 IEEE International Conference on Control and Automation]]></conf-name>
<conf-loc> </conf-loc>
<page-range>3188-3190</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tassier]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
</person-group>
<source><![CDATA[SIR Model of Epidemics]]></source>
<year>2005</year>
<page-range>1-9</page-range><publisher-loc><![CDATA[New York ]]></publisher-loc>
<publisher-name><![CDATA[Department of Economics, Fordham University]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
<name>
<surname><![CDATA[Chenxi]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
</person-group>
<source><![CDATA[Modeling the effects of timing parameters on virus propagation]]></source>
<year>2003</year>
<conf-name><![CDATA[ Proceedings of WORM'03]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-6</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
