메뉴 건너뛰기




Volumn , Issue , 2005, Pages 52-59

Worm evolution tracking via timing analysis

Author keywords

Internet worms; Methods of attribution; Network security

Indexed keywords

INTERNET WORMS; METHOD OF ATTRIBUTION; NETWORK SECURITY;

EID: 31844457315     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (22)

References (24)
  • 2
    • 84858547800 scopus 로고    scopus 로고
    • CAIDA. http://www.caida.org.
  • 5
    • 0042474227 scopus 로고    scopus 로고
    • Modeling the spread of active worms
    • Zesheng Chen, Lixin Gao, and Kevin Kwiat. Modeling the Spread of Active Worms. In Proceedings of IEEE INFOCOMM, volume 3, pages 1890 - 1900, 2003.
    • (2003) Proceedings of IEEE INFOCOMM , vol.3 , pp. 1890-1900
    • Chen, Z.1    Gao, L.2    Kwiat, K.3
  • 6
    • 0034486891 scopus 로고    scopus 로고
    • The mathematics of infectious diseases
    • H.W. Hethcote. The Mathematics of Infectious Diseases. In SIAM Reviews, Vol. 42 No. 4, 2000.
    • (2000) SIAM Reviews , vol.42 , Issue.4
    • Hethcote, H.W.1
  • 7
    • 84858544285 scopus 로고    scopus 로고
    • iSink- University of Wisconsin, http://wail.cs.wisc.edu/.
  • 8
    • 31844447541 scopus 로고    scopus 로고
    • Exploiting underlying structure for detailed reconstruction of an internet-scale event
    • Abhishek Kumar, Vern Paxson, and Nicholas Weaver. Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale Event. In Technical Report.
    • Technical Report
    • Kumar, A.1    Paxson, V.2    Weaver, N.3
  • 12
    • 0141762461 scopus 로고    scopus 로고
    • Code-Red: A case study on the spread and victims of an Internet worm
    • November
    • David Moore, Collen Shannon, and Jeffry Brown. Code-Red: A case study on the spread and victims of an Internet worm. In Proceedings of Internet Measurement Workshop, pages 273-284, November 2002.
    • (2002) Proceedings of Internet Measurement Workshop , pp. 273-284
    • Moore, D.1    Shannon, C.2    Brown, J.3
  • 16
    • 14844308379 scopus 로고    scopus 로고
    • Containment of scanning worms in enterprose networks
    • Stuart Staniford. Containment of Scanning Worms in Enterprose Networks. In Journal of Computer Security, 2004.
    • (2004) Journal of Computer Security
    • Staniford, S.1
  • 21
    • 84948951525 scopus 로고    scopus 로고
    • Throttling viruses: Restricting propagation to defeat malicious mobile code
    • December
    • Matthew M. Williamson. Throttling Viruses: Restricting Propagation to Defeat Malicious Mobile Code. In Proceedings of the 18th Annual Computer Security Conference, pages 61-68, December 2002.
    • (2002) Proceedings of the 18th Annual Computer Security Conference , pp. 61-68
    • Williamson, M.M.1
  • 22
    • 84858536738 scopus 로고    scopus 로고
    • The CAIDA Dataset on the Witty Worm - March 19-24, 2004, Support for the Witty Worm dataset and the UCSD Network Telescope are provided by Cisco Systems, Limelight Networks, DHS, NSF, CAIDA, DARPA, Digital Envoy, and CAIDA Members
    • The CAIDA Dataset on the Witty Worm - March 19-24, 2004, Colleen Shannon and David Moore, http://www.caida.org/ passive/witty/. Support for the Witty Worm dataset and the UCSD Network Telescope are provided by Cisco Systems, Limelight Networks, DHS, NSF, CAIDA, DARPA, Digital Envoy, and CAIDA Members.
    • Shannon, C.1    Moore, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.