메뉴 건너뛰기




Volumn , Issue , 2005, Pages 528-537

Modeling and automated containment of worms

Author keywords

Automatic worm containment; Branching process model; Early phase propagation; Internet scanning worms; Stochastic worm modeling

Indexed keywords

AUTOMATED CONTAINMENT; BRANCHING PROCESS MODEL; MODELING; SELF-PROPAGATING CODES;

EID: 27544467181     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DSN.2005.66     Document Type: Conference Paper
Times cited : (35)

References (25)
  • 4
    • 0041769199 scopus 로고    scopus 로고
    • Generalized poisson distributions, properties and applications
    • Marcel Dekker, Inc.
    • P. C. Consul, "Generalized Poisson Distributions, Properties and Applications," STATISTICS: textboods and monographs, vol 99, Marcel Dekker, Inc.
    • STATISTICS: Textboods and Monographs , vol.99
    • Consul, P.C.1
  • 6
    • 26444492032 scopus 로고
    • A first course in stochastic processes, second edition
    • S. Karlin and H. M. Taylor, "A First Course in Stochastic Processes, Second Edition," Academic Press, 1975.
    • (1975) Academic Press
    • Karlin, S.1    Taylor, H.M.2
  • 10
    • 18844367440 scopus 로고    scopus 로고
    • Simulating realistic network worm traffic for worm warning system design and testing
    • Oct.
    • M. Liljenstam, D. M. Nicol, V. H. Berk, and R. S. Gray, "Simulating Realistic Network Worm Traffic for Worm Warning System Design and Testing," WORM'03, pp.24-33, Oct. 2003.
    • (2003) WORM'03 , pp. 24-33
    • Liljenstam, M.1    Nicol, D.M.2    Berk, V.H.3    Gray, R.S.4
  • 14
    • 0003778293 scopus 로고    scopus 로고
    • Stochastic processes, 2nd edition
    • S. Ross "Stochastic Processes, 2nd edition" John Wiley & Sons, Inc, 1996.
    • (1996) John Wiley & Sons, Inc
    • Ross, S.1
  • 16
    • 14844308379 scopus 로고    scopus 로고
    • Containment of scanning worms in enterprise networks
    • to appear
    • S. Staniford, "Containment of Scanning Worms in Enterprise Networks," Journal of Computer Security, to appear
    • Journal of Computer Security
    • Staniford, S.1
  • 17
    • 84948951525 scopus 로고    scopus 로고
    • Throttling viruses: Restricting propagation to defeat malicious mobile code
    • M. M. Williamson "Throttling Viruses: Restricting Propagation to Defeat Malicious Mobile Code," Proceedings of ACSAC Security Conference, 2002.
    • (2002) Proceedings of ACSAC Security Conference
    • Williamson, M.M.1
  • 21
    • 14944368398 scopus 로고    scopus 로고
    • Worm propagation modeling and analysis under dynamic quarantine defense
    • C. C. Zou, W. Gong, and D. Towsley, "Worm Propagation Modeling and Analysis under Dynamic Quarantine Defense," WORM'03, pp. 51-60, 2003.
    • (2003) WORM'03 , pp. 51-60
    • Zou, C.C.1    Gong, W.2    Towsley, D.3
  • 25
    • 0034486891 scopus 로고    scopus 로고
    • The mathematics of infectious diseases
    • H. W. Hethcote, "The Mathematics of Infectious Diseases," In SIAM Review, vol. 42, no. 4, pp. 599-653, 2000.
    • (2000) SIAM Review , vol.42 , Issue.4 , pp. 599-653
    • Hethcote, H.W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.