메뉴 건너뛰기




Volumn 152, Issue , 2006, Pages

Simulating non-scanning worms on peer-to-peer networks

Author keywords

[No Author keywords available]

Indexed keywords

DOMAIN NAME SYSTEM (DNS); ONLINE DETECTION; ONLINE DETECTION ALGORITHM;

EID: 34547335735     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1146847.1146876     Document Type: Conference Paper
Times cited : (28)

References (55)
  • 4
    • 22344449516 scopus 로고    scopus 로고
    • An analysis of the Skype peer-to-peer Internet telephony protocol
    • Technical Report CUCS-039-04, Columbia University, September
    • S.A. Baset and H. Schulzrinne. An analysis of the Skype peer-to-peer Internet telephony protocol. Technical Report CUCS-039-04, Columbia University, September 2004.
    • (2004)
    • Baset, S.A.1    Schulzrinne, H.2
  • 9
    • 33746906191 scopus 로고    scopus 로고
    • Last accessed: November
    • B. Ediger. Simulating network worms. http://www.users.qwest.net/ ~eballen1/nws/. Last accessed: November 2005.
    • (2005) Simulating network worms
    • Ediger, B.1
  • 15
    • 0003134671 scopus 로고    scopus 로고
    • Proceedings of the Fifth ACM International Conference on Knowledge Discovery and Data Mining
    • San Diego, CA, Aug
    • V. Guralnik and J. Srivastava. Event detection from time series data. In Proceedings of the Fifth ACM International Conference on Knowledge Discovery and Data Mining, San Diego, CA, Aug. 1999.
    • (1999) Event detection from time series data
    • Guralnik, V.1    Srivastava, J.2
  • 17
    • 0034486891 scopus 로고    scopus 로고
    • The mathematics of infectious diseases
    • Oct
    • H. W. Hethcote. The mathematics of infectious diseases. SIAM Review, 42(4), Oct. 2000.
    • (2000) SIAM Review , vol.42 , Issue.4
    • Hethcote, H.W.1
  • 18
    • 85084164812 scopus 로고    scopus 로고
    • X. Jiang and D. Xu. Collapsar: A VM-Based Architecture for Network Attack Detention Center. In Proceedings of the 13th USENIX Security Symposium, San Diego, CA, Aug. 2004.
    • X. Jiang and D. Xu. Collapsar: A VM-Based Architecture for Network Attack Detention Center. In Proceedings of the 13th USENIX Security Symposium, San Diego, CA, Aug. 2004.
  • 26
    • 0141762461 scopus 로고    scopus 로고
    • D. Moore, C. Shannon, and k claffy. Code-Red: a case study on the spread and victims of an Internet worm. In Proceedings of the Second ACM Internet Measurement Workshop, 2002.
    • D. Moore, C. Shannon, and k claffy. Code-Red: a case study on the spread and victims of an Internet worm. In Proceedings of the Second ACM Internet Measurement Workshop, 2002.
  • 28
    • 14944381614 scopus 로고    scopus 로고
    • Network telescopes: Technical report
    • Technical report, Cooperative Association for Internet Data Analysis CAIDA, July
    • D. Moore, C. Shannon, G. M. Voelker, and S. Savage. Network telescopes: Technical report. Technical report, Cooperative Association for Internet Data Analysis (CAIDA), July 2004.
    • (2004)
    • Moore, D.1    Shannon, C.2    Voelker, G.M.3    Savage, S.4
  • 31
    • 34547251529 scopus 로고    scopus 로고
    • H. Project. Know your enemy: Honeynets, Nov. 2003.
    • H. Project. Know your enemy: Honeynets, Nov. 2003.
  • 34
    • 0003007594 scopus 로고    scopus 로고
    • Pastry: Scalable, distributed object location and routing for large-scale peerto-peer systems
    • Heidelberg, Germany, Nov
    • A. Rowstron and P. Druschel. Pastry: Scalable, distributed object location and routing for large-scale peerto-peer systems. In Proceedings of the 2001 International Middleware Conference, Heidelberg, Germany, Nov. 2001.
    • (2001) Proceedings of the 2001 International Middleware Conference
    • Rowstron, A.1    Druschel, P.2
  • 35
    • 1442284120 scopus 로고    scopus 로고
    • Measuring and analyzing the characteristics of Napster and Gnutella hosts
    • S. Saroiu, K. P. Gummadi, and S. D. Gribble. Measuring and analyzing the characteristics of Napster and Gnutella hosts. Multimedia Systems, 9(2), 2003.
    • (2003) Multimedia Systems , vol.9 , Issue.2
    • Saroiu, S.1    Gummadi, K.P.2    Gribble, S.D.3
  • 37
    • 2442537008 scopus 로고    scopus 로고
    • Analyzing peer-to-peer traffic across large networks
    • Apr
    • S. Sen and J. Wang. Analyzing peer-to-peer traffic across large networks. IEEE/ACM Transactions on Networking, 12(2), Apr. 2004.
    • (2004) IEEE/ACM Transactions on Networking , vol.12 , Issue.2
    • Sen, S.1    Wang, J.2
  • 38
    • 34547374965 scopus 로고    scopus 로고
    • M. Singer. Benjamin worm plagues KaZaA. Internetnews.com, May 2002.
    • M. Singer. Benjamin worm plagues KaZaA. Internetnews.com, May 2002.
  • 40
    • 0242444735 scopus 로고
    • The Internet worm: Crisis and aftermath
    • June
    • E. H. Spafford. The Internet worm: Crisis and aftermath. Communications of the ACM, 32(6), June 1989.
    • (1989) Communications of the ACM , vol.32 , Issue.6
    • Spafford, E.H.1
  • 52
    • 24344475143 scopus 로고    scopus 로고
    • Analyzing impacts of peer-to-peer systems on propagation of active worm attacks
    • Technical report, Department of Computer Science and Engineering, The Ohio-State University, Mar
    • W. Yu, C. Boyer, and D. Xuan. Analyzing impacts of peer-to-peer systems on propagation of active worm attacks. Technical report, Department of Computer Science and Engineering, The Ohio-State University, Mar. 2004.
    • (2004)
    • Yu, W.1    Boyer, C.2    Xuan, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.