메뉴 건너뛰기




Volumn 24, Issue 4, 2005, Pages 334-346

A survey and trends on Internet worms

Author keywords

Internet worms; Network security; Propagation model; Scanning strategies

Indexed keywords

COMPUTER NETWORKS; COMPUTER SYSTEMS; COMPUTER VIRUSES; MATHEMATICAL MODELS; PROBLEM SOLVING; SECURITY OF DATA;

EID: 19944374456     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2004.10.001     Document Type: Article
Times cited : (61)

References (69)
  • 1
    • 0033979874 scopus 로고    scopus 로고
    • Comparison of deterministic and stochastic SIS and SIR models in discrete time
    • L.J. Allen, and A.M. Burgin Comparison of deterministic and stochastic SIS and SIR models in discrete time Mathematical Biosciences 163 2000 1 33
    • (2000) Mathematical Biosciences , vol.163 , pp. 1-33
    • Allen, L.J.1    Burgin, A.M.2
  • 5
    • 8644273520 scopus 로고    scopus 로고
    • An environment for controlled worm replication and analysis
    • Published at the September
    • Arnold B, Chess D, Morar J, Segal A, Swimmer M. An environment for controlled worm replication and analysis. Published at the Virus Bulletin; September 2000. p. 1-20.
    • (2000) Virus Bulletin , pp. 1-20
    • Arnold, B.1    Chess, D.2    Morar, J.3    Segal, A.4    Swimmer, M.5
  • 14
    • 0004204717 scopus 로고    scopus 로고
    • The design of GrIDS: A graph-based intrusion detection system
    • U.C. Davis Computer Science Department
    • Cheung S, Hoagland J, Levitt K, Rowe J, Staniford C, Yip R, et al. The design of GrIDS: a graph-based intrusion detection system. Technical report CSE-99-2. U.C. Davis Computer Science Department
    • Technical Report , vol.CSE-99-2
    • Cheung, S.1    Hoagland, J.2    Levitt, K.3    Rowe, J.4    Staniford, C.5    Yip, R.6
  • 15
    • 19944366401 scopus 로고    scopus 로고
  • 16
    • 0004246220 scopus 로고
    • Ph.D. thesis, University of Southern California
    • Cohen F. Computer viruses. Ph.D. thesis, University of Southern California; 1985. p. 1-5.
    • (1985) Computer Viruses , pp. 1-5
    • Cohen, F.1
  • 18
    • 0023294949 scopus 로고
    • [also appearing in Computers and Security 1987;6:22-35]
    • (1987) Computers and Security , vol.6 , pp. 22-35
  • 19
    • 19944378939 scopus 로고    scopus 로고
    • Computer Emergency Response Team (CERT)
  • 22
    • 19944379618 scopus 로고    scopus 로고
    • A potency relation for worms and next-generation attack tools
    • 12 March
    • Ellis D. A potency relation for worms and next-generation attack tools. MITRE Technical report; 12 March 2002.
    • (2002) MITRE Technical Report
    • Ellis, D.1
  • 25
    • 8644229619 scopus 로고    scopus 로고
    • The Art of port scanning
    • Fyodor The Art of port scanning Phrack Magazine 7 51 September 1997 11 17
    • (1997) Phrack Magazine , vol.7 , Issue.51 , pp. 11-17
    • Fyodor1
  • 27
    • 19944396923 scopus 로고    scopus 로고
    • Global Slapper Worm Information Center
  • 30
    • 19944364655 scopus 로고    scopus 로고
  • 36
    • 17644421307 scopus 로고    scopus 로고
    • Recent worms: A survey and trends
    • D.M. Kienzle, and M.C. Elder Recent worms: a survey and trends WORM'03 October 2003
    • (2003) WORM'03
    • Kienzle, D.M.1    Elder, M.C.2
  • 45
    • 34147212851 scopus 로고    scopus 로고
    • Fighting worms with Honeypots:Honeyd vs Msblast.exe
    • L. Oudot Fighting worms with Honeypots:Honeyd vs Msblast.exe Honeypots mailinglist August 2003
    • (2003) Honeypots Mailinglist
    • Oudot, L.1
  • 48
    • 19944425635 scopus 로고    scopus 로고
  • 50
    • 84976720856 scopus 로고
    • The worm programs early experience with a distributed computation
    • Shoch, F. John, and A.H. Jon The worm programs early experience with a distributed computation Communications of the ACM 25 3 1982 172 180
    • (1982) Communications of the ACM , vol.25 , Issue.3 , pp. 172-180
    • Shoch1    John, F.2    Jon, A.H.3
  • 52
    • 19944392073 scopus 로고    scopus 로고
  • 53
    • 0003545819 scopus 로고
    • The Internet worm program: An analysis
    • Department of Computer Science, Purdue University
    • Spafford EH. The Internet worm program: an analysis. Technical report CSD-TR-823, Department of Computer Science, Purdue University; 1988. p. 1-29.
    • (1988) Technical Report , vol.CSD-TR-823 , pp. 1-29
    • Spafford, E.H.1
  • 64
    • 8644224392 scopus 로고    scopus 로고
    • Information Technologies & Science College, Nankai University, Tianjin, P.R. China
    • Zheng H. Internet worm research [for the degree of PhD]. Information Technologies & Science College, Nankai University, Tianjin, P.R. China; 2003. p. 12-15.
    • (2003) Internet Worm Research [For the Degree of PhD] , pp. 12-15
    • Zheng, H.1
  • 65
    • 0036119199 scopus 로고    scopus 로고
    • Analysis on Lion worm and some discussing about it
    • X.D. Zuo, and Y.X. Dai Analysis on Lion worm and some discussing about it Computer Engineering 28 1 2002 16 17
    • (2002) Computer Engineering , vol.28 , Issue.1 , pp. 16-17
    • Zuo, X.D.1    Dai, Y.X.2
  • 67
    • 8644220815 scopus 로고    scopus 로고
    • On the performance of Internet worm scanning strategies
    • November
    • Zou CC, Gong W, Towsley D. On the performance of Internet worm scanning strategies. Mass ECE Technical report TR-03-CSE-07; November 2003.
    • (2003) Mass ECE Technical Report , vol.307
    • Zou, C.C.1    Gong, W.2    Towsley, D.3
  • 68
    • 8644236108 scopus 로고    scopus 로고
    • Routing worm: A fast, selective attack worm based on IP address information
    • November
    • Zou CC, Towsley D, Gong W, Cai S. Routing worm: a fast, selective attack worm based on IP address information. Umass ECE Technical report TR-03-CSE-06; November 2003.
    • (2003) Umass ECE Technical Report , vol.TR-03-CSE-06
    • Zou, C.C.1    Towsley, D.2    Gong, W.3    Cai, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.