메뉴 건너뛰기




Volumn 17, Issue 10, 2006, Pages 2118-2130

Research and development of instant messaging worms

Author keywords

IM (instant messaging) worm; Internet worm; Network security; Network topology; Propagation model

Indexed keywords

COMMUNICATION; INTERNET; PREVENTION; TOPOLOGY;

EID: 33751574795     PISSN: 10009825     EISSN: None     Source Type: Journal    
DOI: 10.1360/jos172118     Document Type: Article
Times cited : (11)

References (38)
  • 1
    • 85084162258 scopus 로고    scopus 로고
    • How to own the Internet in your spare time
    • Boneh D. (ed.), San Francisco
    • Staniford S, Paxson V, Weaver N. How to own the Internet in your spare time. In: Boneh D, ed. Proc. of the 11th Usenix Security Symp. San Francisco, 2002. http://www.icir.org/vern/papers/cdc-usenix-sec02/cdc.pdf
    • (2002) Proc. of the 11th Usenix Security Symp
    • Staniford, S.1    Paxson, V.2    Weaver, N.3
  • 2
    • 0038289949 scopus 로고    scopus 로고
    • Warhol worms: The potential for very fast Internet plagues
    • Weaver N. Warhol worms: The potential for very fast Internet plagues. 2002. http://www.cs.berkeley.edu/-nweaver/warhol.html
    • (2002)
    • Weaver, N.1
  • 3
    • 21644432294 scopus 로고    scopus 로고
    • Computers and epidemiology
    • Kephart JO, Chess DM, White SR. Computers and epidemiology. http://www.research.ibm.com/antivirus/ SciPapers/Kephart/Spectrum/Spectrum.html
    • Kephart, J.O.1    Chess, D.M.2    White, S.R.3
  • 5
    • 33751564201 scopus 로고    scopus 로고
    • Email worm modeling and defense
    • Zou CC, Towsley D, Gong W. Email worm modeling and defense. 2004. http://www-unix.ecs.umass.edu/-gong/papers/emailModel-ICCCN04.pdf
    • (2004)
    • Zou, C.C.1    Towsley, D.2    Gong, W.3
  • 6
    • 0041534274 scopus 로고    scopus 로고
    • A snapshot of global Internet worm activity
    • Technical Report, Arbor Networks
    • Song D, Malan R, Stone R. A snapshot of global Internet worm activity. Technical Report, Arbor Networks, 2001. http://www.first.org/events/progconf/2002/d5-02-song-slides.pdf
    • (2001)
    • Song, D.1    Malan, R.2    Stone, R.3
  • 7
    • 33751566470 scopus 로고    scopus 로고
    • IM management, security and compliance solutions
    • Imlogic
    • Imlogic. IM management, security and compliance solutions. 2006. http://www.imlogic.com
    • (2006)
  • 11
    • 33751569182 scopus 로고    scopus 로고
    • iResearch Consulting Group. China Instant Messaging Research Report
    • iResearch Consulting Group. China Instant Messaging Research Report. 2005. http://wwwh.iresearch.com.cn/
    • (2005)
  • 12
    • 14944375512 scopus 로고    scopus 로고
    • Malicious threats and vulnerabilities in instant messaging
    • Hindocha N, Chien E. Malicious threats and vulnerabilities in instant messaging. 2005. http://www.symantec.com/avcenter/reference/ malicious.threats.instant.messaging.pdf
    • (2005)
    • Hindocha, N.1    Chien, E.2
  • 13
    • 33751575431 scopus 로고    scopus 로고
    • 2005 real-time communication security: The year in review
    • IMlogic Threat Center
    • IMlogic Threat Center. 2005 real-time communication security: The year in review. 2005. http://www.imlogic.com/pdf/2005ThreatCenter_report.pdf
    • (2005)
  • 14
    • 33751570100 scopus 로고    scopus 로고
    • CN/CERT. CN/CERT China Network Security Research Annual Report
    • CN/CERT. CN/CERT China Network Security Research Annual Report. 2005. http://www.hais.org.cn/doc/2005CNCERTCC AnnualReport_Chinese.pdf
    • (2005)
  • 16
    • 8644224392 scopus 로고    scopus 로고
    • Internet worm research
    • Tianjin: Nankai University, Chinese source
    • Zheng H. Internet worm research[Ph. D. Thesis]. Tianjin: Nankai University, 2003 (in Chinese with English abstract).
    • (2003)
    • Zheng, H.1
  • 17
    • 33751577149 scopus 로고    scopus 로고
    • Messenger APIs
    • Messenger APIs. http://msdn.microsoft.com/downloads/list/messengerapi.asp
  • 18
    • 33751556301 scopus 로고    scopus 로고
    • ICQ APIs
    • ICQ APIs. http://www.icq.com/api/
  • 19
    • 33751569013 scopus 로고    scopus 로고
    • W32. Choke. Worm
    • W32. Choke. Worm. http://securityresponse.symantec.com /avcenter/venc/data/w32.choke.worm.html
  • 20
    • 33751583932 scopus 로고    scopus 로고
    • W32. Goner. A@mm
    • W32. Goner. A@mm. http://securityresponse. symantec.com/avcenter/venc/data/w32.goner.a@mm.html
  • 21
    • 33751576119 scopus 로고    scopus 로고
    • W32. AimVen@mm
    • W32. AimVen@mm. http://securityresponse.symantec.com/ avcenter/venc/data/w32.aimven.worm.html
  • 22
    • 33751579081 scopus 로고    scopus 로고
    • W32. Kelvir. HI@mm
    • W32. Kelvir. HI@mm. http://securityresponse.symantec.com/ avcenter/venc/data/w32.kelvir.hi.html
  • 23
    • 33751560358 scopus 로고    scopus 로고
    • W32. SoFunny. Worm
    • W32. SoFunny. Worm. http://securityresponse.symantec.com/ avcenter/venc/data/w32.sofunny.html
  • 24
    • 33751568835 scopus 로고    scopus 로고
    • W32. Aplore@mm
    • W32. Aplore@mm. http://securityresponse.symantec.com/ avcenter/venc/data/w32.aplore@mm.html
  • 25
    • 33751582016 scopus 로고    scopus 로고
    • W32. Serflog. A@mm
    • W32. Serflog. A@mm. http://securityresponse.symantec.com/ avcenter/venc/data/w32.serflog.a@mm.html
  • 26
    • 33751583174 scopus 로고    scopus 로고
    • W32. Bizex. worm
    • W32. Bizex. worm. http://securityresponse.symantec.com/ avcenter/venc/data/w32.bizex.worm.html
  • 27
    • 33751578985 scopus 로고    scopus 로고
    • W32. Bropia. F. worm
    • W32. Bropia. F. worm. http://securityresponse.symantec.com/ avcenter/venc/data/w32.bropia.f worm.html
  • 30
    • 4544275741 scopus 로고    scopus 로고
    • Modeling the effects of timing parameters on virus propagation
    • Staniford S. (ed.), Washington
    • Wang Y, Wang CX. Modeling the effects of timing parameters on virus propagation. In: Staniford S, ed. Proc. of the ACM CCS Workshop on Rapid Malcode (WORM 2003). Washington, 2003. http://www.ece.cmu.edu/-chenxi/pub/worm.pdf
    • (2003) Proc. of the ACM CCS Workshop on Rapid Malcode (WORM 2003)
    • Wang, Y.1    Wang, C.X.2
  • 31
    • 0004140894 scopus 로고    scopus 로고
    • Search in power-law networks
    • Technical Report, 1063-651X, American Physical Society
    • Adamic LA, Lukose RM, Puniyani AR, Hubermanl BA. Search in power-law networks. Technical Report, 1063-651X, American Physical Society, 2001. 64-71. http://www.hpl.hp.com/research/idl/papers/plsearch/pre46135.pdf
    • (2001) , pp. 64-71
    • Adamic, L.A.1    Lukose, R.M.2    Puniyani, A.R.3    Hubermanl, B.A.4
  • 32
    • 0036792011 scopus 로고    scopus 로고
    • Classification of scale-free networks
    • Goh K, Oh E, Jeong H, Kahng B, Kim D. Classification of scale-free networks. PNAS, 2002, 99(20): 12583-12588.
    • (2002) PNAS , vol.99 , Issue.20 , pp. 12583-12588
    • Goh, K.1    Oh, E.2    Jeong, H.3    Kahng, B.4    Kim, D.5
  • 33
    • 0037861702 scopus 로고    scopus 로고
    • Instant messaging as a scale-free network
    • Smith RD. Instant messaging as a scale-free network. 2006. http://arxiv.org/abs/cond-mat/0206378
    • (2006)
    • Smith, R.D.1
  • 35
    • 33751582673 scopus 로고    scopus 로고
    • The project of completely automated public turing test to tell computers and humans apart
    • Carnegie Mellon University
    • Carnegie Mellon University. The project of completely automated public turing test to tell computers and humans apart. 2005. http://www.captcha.net/
    • (2005)
  • 36
    • 33751573192 scopus 로고    scopus 로고
    • Yahoo fills in messenger hole
    • News.com Staff
    • News.com Staff. Yahoo fills in messenger hole. 2005. http://news.com.com/2100-1023-923638.html
    • (2005)
  • 37
    • 84948951525 scopus 로고    scopus 로고
    • Throttling viruses: Restricting propagation to defeat malicious mobile code
    • Las Vegas
    • Williamson M. Throttling viruses: Restricting propagation to defeat malicious mobile code. In: Proc. of the 18th Annual Computer Security Applications Conf. (ACSAC). Las Vegas, 2002. 61-68. http://www.acsa-admin.org/2002/papers/97.pdf
    • (2002) Proc. of the 18th Annual Computer Security Applications Conf. (ACSAC) , pp. 61-68
    • Williamson, M.1
  • 38
    • 33751575600 scopus 로고    scopus 로고
    • Securing instant messaging
    • Symantec Group
    • Symantec Group. Securing instant messaging. 2006. http://www.symantec.com/avcenter/ reference/secure.instant.messaging.pdf
    • (2006)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.