{"id":"https://openalex.org/W2047522759","doi":"https://doi.org/10.1145/1141277.1141356","title":"An initial analysis and presentation of malware exhibiting swarm-like behavior","display_name":"An initial analysis and presentation of malware exhibiting swarm-like behavior","publication_year":2006,"publication_date":"2006-04-23","ids":{"openalex":"https://openalex.org/W2047522759","doi":"https://doi.org/10.1145/1141277.1141356","mag":"2047522759"},"language":"en","primary_location":{"id":"doi:10.1145/1141277.1141356","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1141277.1141356","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2006 ACM symposium on Applied computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059090211","display_name":"Fernando C. Col\u00f3n Osorio","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Fernando C. Col\u00f3n Osorio","raw_affiliation_strings":["Wireless System Security Research Laboratory, Marlboro, Massachusetts"],"affiliations":[{"raw_affiliation_string":"Wireless System Security Research Laboratory, Marlboro, Massachusetts","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004162155","display_name":"Zachi Klopman","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zachi Klopman","raw_affiliation_strings":["Wireless System Security Research Laboratory, Marlboro, Massachusetts"],"affiliations":[{"raw_affiliation_string":"Wireless System Security Research Laboratory, Marlboro, Massachusetts","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5059090211"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.9053,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.77074919,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"323","last_page":"329"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7865251302719116},{"id":"https://openalex.org/keywords/swarm-behaviour","display_name":"Swarm behaviour","score":0.7622588872909546},{"id":"https://openalex.org/keywords/swarm-intelligence","display_name":"Swarm intelligence","score":0.7250052690505981},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6257576942443848},{"id":"https://openalex.org/keywords/simple","display_name":"Simple (philosophy)","score":0.543135404586792},{"id":"https://openalex.org/keywords/swarm-robotics","display_name":"Swarm robotics","score":0.537755012512207},{"id":"https://openalex.org/keywords/limiting","display_name":"Limiting","score":0.5049625039100647},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4941711723804474},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4719972610473633},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3460818827152252},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.21007263660430908},{"id":"https://openalex.org/keywords/particle-swarm-optimization","display_name":"Particle swarm optimization","score":0.19166061282157898},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.07442951202392578}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7865251302719116},{"id":"https://openalex.org/C181335050","wikidata":"https://www.wikidata.org/wiki/Q14915018","display_name":"Swarm behaviour","level":2,"score":0.7622588872909546},{"id":"https://openalex.org/C119487961","wikidata":"https://www.wikidata.org/wiki/Q863960","display_name":"Swarm intelligence","level":3,"score":0.7250052690505981},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6257576942443848},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.543135404586792},{"id":"https://openalex.org/C169337768","wikidata":"https://www.wikidata.org/wiki/Q2446723","display_name":"Swarm robotics","level":3,"score":0.537755012512207},{"id":"https://openalex.org/C188198153","wikidata":"https://www.wikidata.org/wiki/Q1613840","display_name":"Limiting","level":2,"score":0.5049625039100647},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4941711723804474},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4719972610473633},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3460818827152252},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.21007263660430908},{"id":"https://openalex.org/C85617194","wikidata":"https://www.wikidata.org/wiki/Q2072794","display_name":"Particle swarm optimization","level":2,"score":0.19166061282157898},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.07442951202392578},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1141277.1141356","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1141277.1141356","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2006 ACM symposium on Applied computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":2,"referenced_works":["https://openalex.org/W1994340575","https://openalex.org/W2023955403"],"related_works":["https://openalex.org/W4233987368","https://openalex.org/W65954170","https://openalex.org/W1988876749","https://openalex.org/W2182522217","https://openalex.org/W4386001959","https://openalex.org/W4234675952","https://openalex.org/W4304182880","https://openalex.org/W4362659455","https://openalex.org/W2789344126","https://openalex.org/W2985447784"],"abstract_inverted_index":{"The":[0],"Slammer,":[1],"which":[2],"is":[3,35,122,132,221],"currently":[4],"the":[5,27,31,90,125,133,172,176,184,204,213],"fastest":[6],"computer":[7],"worm":[8,33],"in":[9,188],"recorded":[10],"history,":[11],"was":[12,50],"observed":[13],"to":[14,73,81,110,160,190],"infect":[15],"90":[16],"percent":[17],"of":[18,40,83,115,127,135,151,178,207,223,230],"all":[19],"vulnerable":[20],"Internets":[21],"hosts":[22],"within":[23],"10":[24],"minutes.":[25],"Although":[26],"main":[28],"action":[29],"that":[30,47,82,92,219],"Slammer":[32],"takes":[34],"a":[36,112,193,226],"relatively":[37],"unsophisticated":[38],"replication":[39],"itself,":[41],"it":[42],"still":[43],"spreads":[44],"so":[45],"quickly":[46],"human":[48],"response":[49],"ineffective.":[51,106],"Most":[52],"proposed":[53],"countermeasures":[54],"strategies":[55,67],"are":[56,68,79],"based":[57],"primarily":[58],"on":[59,124,203],"rate":[60,227],"detection":[61],"and":[62,71,100,162],"limiting":[63],"algorithms.":[64],"However,":[65],"such":[66,102,142,209],"being":[69],"designed":[70],"developed":[72],"effectively":[74],"contain":[75],"worms":[76,95,116,235],"whose":[77,120],"behaviors":[78],"similar":[80,234],"Slammer.In":[84],"our":[85],"work,":[86],"we":[87,108,169,198],"put":[88],"forth":[89],"hypothesis":[91],"next":[93],"generation":[94,114],"will":[96,104,170,199,217],"be":[97,191],"radically":[98],"different,":[99],"potentially":[101],"techniques":[103],"prove":[105],"Specifically,":[107],"propose":[109],"study":[111],"new":[113],"called":[117,212],"\"Swarm":[118,179],"Worms\",":[119,180],"behavior":[121,134],"predicated":[123],"concept":[126],"\"emergent":[128],"intelligence\".":[129],"Emergent":[130],"Intelligence":[131],"systems,":[136],"very":[137],"much":[138],"like":[139],"biological":[140],"systems":[141],"as":[143,181,183],"ants":[144],"or":[145],"bees,":[146],"where":[147],"simple":[148,155],"local":[149],"interactions":[150],"autonomous":[152],"members,":[153],"with":[154],"primitive":[156],"actions,":[157],"gives":[158],"rise":[159],"complex":[161],"intelligent":[163],"global":[164],"behavior.":[165],"In":[166,196],"this":[167],"manuscript":[168],"introduce":[171],"basic":[173,185],"principles":[174],"behind":[175],"idea":[177],"well":[182],"structure":[186],"required":[187],"order":[189],"considered":[192],"\"swarm":[194],"worm\".":[195],"addition,":[197],"present":[200],"preliminary":[201],"results":[202],"propagation":[205],"speeds":[206],"one":[208],"swarm":[210,237],"worm,":[211],"ZachiK":[214,220],"worm.":[215],"We":[216],"show":[218],"capable":[222],"propagating":[224],"at":[225],"2":[228],"orders":[229],"magnitude":[231],"faster":[232],"than":[233],"without":[236],"capabilities.":[238]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
