메뉴 건너뛰기




Volumn 13, Issue 5, 2005, Pages 961-974

The monitoring and early detection of internet worms

Author keywords

Computer network security; Early detection; Internet worm; Network monitoring

Indexed keywords

COMPUTER SIMULATION; COMPUTER SYSTEM FIREWALLS; COMPUTER WORMS; KALMAN FILTERING; MATHEMATICAL MODELS; SECURITY OF DATA; SYSTEMS ANALYSIS; TELECOMMUNICATION TRAFFIC;

EID: 28044469549     PISSN: 10636692     EISSN: None     Source Type: Journal    
DOI: 10.1109/TNET.2005.857113     Document Type: Article
Times cited : (195)

References (50)
  • 1
    • 84860930957 scopus 로고    scopus 로고
    • Symantec Early Warning Solutions
    • Symantec Corp.: [Online]. Available
    • Symantec Corp.: Symantec Early Warning Solutions [Online]. Available: http://enterprisesecurity.symantec.com/SecurityServices/
  • 2
    • 0038289958 scopus 로고    scopus 로고
    • ida "Code Red" Worm
    • eEye Digital Security: [Online]. Available
    • eEye Digital Security: ida "Code Red" Worm (2001). [Online]. Available: http://www.eeye.com/html/Research/Advisories/AL20010717.html
    • (2001)
  • 3
    • 8644275018 scopus 로고    scopus 로고
    • Blaster Worm Analysis
    • eEye Digital Security: [Online]. Available
    • eEye Digital Security: Blaster Worm Analysis (2003). [Online]. Available: http://www.eeye.com/html/Research/Advisories/AL20030811.html
    • (2003)
  • 5
    • 0003964874 scopus 로고
    • "Next-Generation Intrusion Detection Expert System (Nides): A Summary"
    • SRI International, Tech. Rep. SRI-CSL-95-07, May
    • D. Anderson, T. Frivold, and A. Valdes, "Next-Generation Intrusion Detection Expert System (Nides): A Summary," SRI International, Tech. Rep. SRI-CSL-95-07, May 1995.
    • (1995)
    • Anderson, D.1    Frivold, T.2    Valdes, A.3
  • 6
    • 1642434224 scopus 로고    scopus 로고
    • "Using sensor networks and data fusion for early detection of active worms"
    • presented at the SPIE AeroSense Symp., Orlando, FL
    • V. H. Berk, R. S. Gray, and G. Bakos, "Using sensor networks and data fusion for early detection of active worms," presented at the SPIE AeroSense Symp., Orlando, FL, 2003.
    • (2003)
    • Berk, V.H.1    Gray, R.S.2    Bakos, G.3
  • 7
    • 28044458400 scopus 로고    scopus 로고
    • Cooperative Association for Internet Data Analysis (CAIDA). [Online]. Available
    • Cooperative Association for Internet Data Analysis (CAIDA). [Online]. Available: http://www.caida.org
  • 8
    • 28044460690 scopus 로고    scopus 로고
    • CERT Coordination Center. [Online]. Available
    • CERT Coordination Center. [Online]. Available: http://www.cert.org
  • 9
    • 28044432636 scopus 로고    scopus 로고
    • CERT/CC Advisories. [Online]. Available
    • CERT/CC Advisories. [Online]. Available: http://www.cert.orgladvisories/
  • 10
    • 0042474227 scopus 로고    scopus 로고
    • "Modeling the spread of active worms"
    • Mar
    • Z. Chen, L. Gao, and K. Kwiat, "Modeling the spread of active worms," in Proc. IEEE INFOCOM, Mar. 2003, pp. 1890-1900.
    • (2003) Proc. IEEE INFOCOM , pp. 1890-1900
    • Chen, Z.1    Gao, L.2    Kwiat, K.3
  • 13
    • 0023294428 scopus 로고
    • "An intrusion detection model"
    • Feb
    • D. Denning, "An intrusion detection model," IEEE Trans. Software Eng., vol. SE-13, no. 2, pp. 222-232, Feb. 1987.
    • (1987) IEEE Trans. Software Eng. , vol.SE-13 , Issue.2 , pp. 222-232
    • Denning, D.1
  • 14
    • 50049130457 scopus 로고    scopus 로고
    • Incidents Maillist: Possible Codered Connection Attempts
    • [Online]. Available
    • D. Goldsmith. Incidents Maillist: Possible Codered Connection Attempts. [Online]. Available: http://lists.jammed.comlincidents/2001/07/0149.html
    • Goldsmith, D.1
  • 15
    • 0032313923 scopus 로고    scopus 로고
    • "Intrusion detection using sequences of system calls"
    • S. A. Hofmeyr, S. Forrest, and A. Somayaji, "Intrusion detection using sequences of system calls," J. Comput. Security, vol. 6, no. 3, pp. 151-180, 1998.
    • (1998) J. Comput. Security , vol.6 , Issue.3 , pp. 151-180
    • Hofmeyr, S.A.1    Forrest, S.2    Somayaji, A.3
  • 16
    • 0038294879 scopus 로고    scopus 로고
    • Honeynet Project [Online]. Available
    • Honeynet Project. Know Your Enemy: Honeynets. [Online]. Available: http://www.honeynet.org/papers/gen2/index.html
    • Know Your Enemy: Honeynets
  • 17
    • 28044459744 scopus 로고    scopus 로고
    • Internet Storm Center [Online]. Available
    • Internet Storm Center. [Online]. Available: http://isc.sans.org/
  • 20
    • 84943680959 scopus 로고
    • "Computers and epidemiology"
    • May
    • J. O. Kephart, S. R. White, and D. M. Chess, "Computers and epidemiology," IEEE Spectrum, vol. 30, no. 5, pp. 20-26, May 1993.
    • (1993) IEEE Spectrum , vol.30 , Issue.5 , pp. 20-26
    • Kephart, J.O.1    White, S.R.2    Chess, D.M.3
  • 21
  • 23
    • 85084163246 scopus 로고    scopus 로고
    • "Autograph: Toward automated, distributed worm signature detection"
    • San Diego, CA, Aug
    • H. Kim and B. Karp, "Autograph: Toward automated, distributed worm signature detection," in Proc. 13th USENIX Security Symp., San Diego, CA, Aug. 2004.
    • (2004) Proc. 13th USENIX Security Symp.
    • Kim, H.1    Karp, B.2
  • 24
    • 84885774862 scopus 로고    scopus 로고
    • "A framework for constructing features and models for intrusion detection systems"
    • Nov
    • W. Lee and S. Stolfo, "A framework for constructing features and models for intrusion detection systems," ACM Trans. Inf. Syst. Security, vol. 3, no. 4, pp. 227-261, Nov. 2000.
    • (2000) ACM Trans. Inf. Syst. Security , vol.3 , Issue.4 , pp. 227-261
    • Lee, W.1    Stolfo, S.2
  • 28
    • 0042474173 scopus 로고    scopus 로고
    • "Internet quarantine: Requirements for containing self-propagating code"
    • Mar
    • D. Moore, C. Shannon, G. M. Voelker, and S. Savage, "Internet quarantine: Requirements for containing self-propagating code," in Proc. IEEE INFOCOM, Mar. 2003, pp. 1901-1910.
    • (2003) Proc. IEEE INFOCOM , pp. 1901-1910
    • Moore, D.1    Shannon, C.2    Voelker, G.M.3    Savage, S.4
  • 29
    • 28044457069 scopus 로고    scopus 로고
    • "Network Telescopes"
    • CAIDA, Tech. Rep. TR-2004-04
    • D. Moore, C. Shannon, G. M. Voelker, and S. Savage, "Network Telescopes," CAIDA, Tech. Rep. TR-2004-04, 2004.
    • (2004)
    • Moore, D.1    Shannon, C.2    Voelker, G.M.3    Savage, S.4
  • 32
    • 28044452950 scopus 로고    scopus 로고
    • SANS Inst. [Online]. Available
    • SANS Inst. [Online]. Available: http://www.sans.org
  • 33
  • 36
    • 28044445764 scopus 로고    scopus 로고
    • "Containment of scanning worms in enterprise networks"
    • to be published
    • S. Staniford, "Containment of scanning worms in enterprise networks," J. Comput. Security, to be published.
    • J. Comput. Security
    • Staniford, S.1
  • 40
    • 28044454620 scopus 로고    scopus 로고
    • DHS Launches Cybersecurity Monitoring Project (Oct.) [Online]. Available
    • D. Verton. (2003, Oct.) DHS Launches Cybersecurity Monitoring Project. [Online]. Available: http://www.peworld.com/news/article/ 0,aid,112764,00.asp
    • (2003)
    • Verton, D.1
  • 42
    • 84948951525 scopus 로고    scopus 로고
    • "Throttling viruses: Restricting propagation to defeat mobile malicious code"
    • presented at the 18th Annu. Computer Security Applications Conf., Las Vegas, NV, Dec
    • M. M. Williamson, "Throttling viruses: Restricting propagation to defeat mobile malicious code," presented at the 18th Annu. Computer Security Applications Conf., Las Vegas, NV, Dec. 2002.
    • (2002)
    • Williamson, M.M.1
  • 43
    • 28044454216 scopus 로고    scopus 로고
    • "An efficient architecture and algorithm for detecting worms with various scan techniques"
    • presented at the 11th Annu. Network and Distributed System Security Symp. (NDSS'04), San Diego, CA, Feb
    • J. Wu, S. Vangala, L. Gao, and K. Kwiat, "An efficient architecture and algorithm for detecting worms with various scan techniques," presented at the 11th Annu. Network and Distributed System Security Symp. (NDSS'04), San Diego, CA, Feb. 2004.
    • (2004)
    • Wu, J.1    Vangala, S.2    Gao, L.3    Kwiat, K.4
  • 44
    • 67249097346 scopus 로고    scopus 로고
    • (Feb.) [Online]. Available
    • C. C. Zou. (2004, Feb.) Internet Worm Propagation Simulator. [Online]. Available: http://www.cs.uef.edu/~czou/research/wormSimulation.html
    • (2004) Internet Worm Propagation Simulator
    • Zou, C.C.1
  • 48
    • 33646150900 scopus 로고    scopus 로고
    • "On the performance of Internet worm scanning strategies"
    • to be published
    • C. C. Zou, D. Towsley, and W. Gong, "On the performance of Internet worm scanning strategies," J. Performance Evaluation, to be published.
    • J. Performance Evaluation
    • Zou, C.C.1    Towsley, D.2    Gong, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.