메뉴 건너뛰기




Volumn , Issue , 2005, Pages 225-237

On the effectiveness of distributed worm monitoring

Author keywords

[No Author keywords available]

Indexed keywords

INTRUSION DETECTION; POPULATION STATISTICS;

EID: 31844452004     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (53)

References (26)
  • 3
    • 0042474227 scopus 로고    scopus 로고
    • Modeling the spread of active worms
    • Z. Chen, L. Gao, and K. Kwiat. Modeling the Spread of Active Worms. In Proceedings of IEEE INFOCOMM, volume 3, pages 1890 – 1900, 2003.
    • (2003) Proceedings of IEEE INFOCOMM , vol.3 , pp. 1890-1900
    • Chen, Z.1    Gao, L.2    Kwiat, K.3
  • 5
    • 8744281125 scopus 로고    scopus 로고
    • August
    • Symantec Corporation. W32.Blaster.Worm. Available at: http://securityresponse.symantec.com/avcenter/venc/data/w32.blaster.worm.html, August 2003.
    • (2003) W32.Blaster.Worm
  • 7
    • 85077553130 scopus 로고    scopus 로고
    • Eeye digital security
    • “eEye Digital Security”. Code Red-II Worm Analysis. http://www.eeye.com/html/Research/Advisories/ AL20010804.html.
    • Code Red-II Worm Analysis
  • 8
    • 85077554189 scopus 로고    scopus 로고
    • Eeye digital security
    • “eEye Digital Security”. Code Red Worm. http://www.eeye.com/html/Research/Advisories/AL20010717.html.
    • Code Red Worm
  • 10
    • 0034486891 scopus 로고    scopus 로고
    • The mathematics of infectious diseases
    • H.W. Hethcote. The Mathematics of Infectious Diseases. In SIAM Reviews, Vol. 42 No. 4, 2000.
    • (2000) SIAM Reviews , vol.42 , Issue.4
    • Hethcote, H.W.1
  • 13
    • 28444495656 scopus 로고    scopus 로고
    • Network telescopes: Observing small or distant security events
    • Invited Talk, August
    • th USENIX Security Symposium, Invited Talk, August 2002.
    • (2002) th USENIX Security Symposium
    • Moore, D.1
  • 14
    • 0141762461 scopus 로고    scopus 로고
    • Code-ReD: A case study on the spread and victims of an internet worm
    • November
    • David Moore, Collen Shannon, and Jeffry Brown. Code-Red: A case study on the spread and victims of an Internet worm. In Proceedings of Internet Measurement Workshop, pages 273–284, November 2002.
    • (2002) Proceedings of Internet Measurement Workshop , pp. 273-284
    • Moore, D.1    Shannon, C.2    Brown, J.3
  • 16
    • 85077632890 scopus 로고    scopus 로고
    • Routeviews- University of Oregon. http://www.routeviews.org
    • Routeviews- University of Oregon. http://www.routeviews.org/.
  • 20
    • 85077627860 scopus 로고    scopus 로고
    • Colleen Shannon and David Moore, Support for the Witty Worm dataset and the UCSD Network Telescope are provided by Cisco Systems, Limelight Networks, DHS, NSF, CAIDA, DARPA, Digital Envoy, and CAIDA Members
    • The CAIDA Dataset on the Witty Worm - March 19-24, 2004, Colleen Shannon and David Moore, http://www.caida.org/passive/witty/. Support for the Witty Worm dataset and the UCSD Network Telescope are provided by Cisco Systems, Limelight Networks, DHS, NSF, CAIDA, DARPA, Digital Envoy, and CAIDA Members.
    • The CAIDA Dataset on the Witty Worm - March 19-24, 2004
  • 24
    • 8644236108 scopus 로고    scopus 로고
    • Routing worm: A fast, selective attack worm based on IP address information
    • November
    • Cliff Zou, D. Towsley, Weibo Gong, and Songlin Cai. Routing Worm: A Fast, Selective Attack Worm based on IP Address Information. UMass ECE Technical Report TR-03-CSE-06, November 2003.
    • (2003) UMass ECE Technical Report TR-03-CSE-06
    • Zou, C.1    Towsley, D.2    Gong, W.3    Cai, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.