메뉴 건너뛰기




Volumn , Issue , 2004, Pages 73-82

A hybrid quarantine defense

Author keywords

Network Modeling and Simulation; Network Security; Worm Detection Systems; Worms

Indexed keywords

ALGORITHMS; COMPUTER SIMULATION; COMPUTER WORMS; INTERNET; NETWORK PROTOCOLS; ROUTERS; TELECOMMUNICATION TRAFFIC;

EID: 14944359480     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1029618.1029630     Document Type: Conference Paper
Times cited : (37)

References (18)
  • 2
    • 4243137229 scopus 로고    scopus 로고
    • Cyber defense technology networking and evaluation
    • R. Bajcsy and T. Benzel et. al, "Cyber defense technology networking and evaluation," Communications of the ACM, Vol 4, No 3, 2004.
    • (2004) Communications of the ACM , vol.4 , Issue.3
    • Bajcsy, R.1    Benzel, T.2
  • 7
    • 0141762461 scopus 로고    scopus 로고
    • Code red: A case study on the spread and victims of an internet worm
    • Marseille, France, November
    • D. Moore, C. Shannon, and J. Brown, "Code Red: A Case Study on the Spread and Victims of an Internet Worm," in Proceedings of the Internet Measures Workshop, Marseille, France, November 2002.
    • (2002) Proceedings of the Internet Measures Workshop
    • Moore, D.1    Shannon, C.2    Brown, J.3
  • 12
    • 14944384392 scopus 로고    scopus 로고
    • Containment of scanning worms in enterprise networks
    • S. Staniford, "Containment of Scanning Worms in Enterprise Networks," in Journal of Computer Security, 2003.
    • (2003) Journal of Computer Security
    • Staniford, S.1
  • 13
    • 0242456135 scopus 로고    scopus 로고
    • Predators: Good mobile code combat against computer viruses
    • Virginia Beach, Virginia, September
    • H. Toyozumi and A. Kara, "Predators: Good Mobile Code Combat against Computer Viruses", New Security Paradigms Workshop, Virginia Beach, Virginia, September 2002.
    • (2002) New Security Paradigms Workshop
    • Toyozumi, H.1    Kara, A.2
  • 14
    • 14944378230 scopus 로고    scopus 로고
    • Shield: Vulnerability-driven network filters for preventing known vulnerability exploits
    • February
    • H. Wang, C. Guo, D. Simon, and A. Zugenmaier, "Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits," Microsoft Research, Technical Report MSR-TR-2003-81, February 2004.
    • (2004) Microsoft Research, Technical Report , vol.MSR-TR-2003-81
    • Wang, H.1    Guo, C.2    Simon, D.3    Zugenmaier, A.4
  • 18
    • 14344250902 scopus 로고    scopus 로고
    • A firewall network system for worm defense in enterprise networks
    • University of Massachusetts, Amherst, February
    • C.C. Zou, D. Towsley, and W. Gong, "A Firewall Network System for Worm Defense in Enterprise Networks," University of Massachusetts, Amherst, Technical Report TR-04-CSE-01, February, 2004.
    • (2004) Technical Report , vol.TR-04-CSE-01
    • Zou, C.C.1    Towsley, D.2    Gong, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.