메뉴 건너뛰기




Volumn 200, Issue , 2006, Pages

Peer to peer networks for defense against internet worms

Author keywords

[No Author keywords available]

Indexed keywords

FLUID MODELS; HUMAN MEDIATION; POTENTIAL HOSTS;

EID: 34748891815     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1190326.1190331     Document Type: Conference Paper
Times cited : (5)

References (29)
  • 3
    • 34748915490 scopus 로고    scopus 로고
    • N. Weaver and D. Ellis, Reflections on the Witty Worm: Analyzing the Attacker, -,login: The USENIX Magazine, 29, no. 3, pp. 34-37, June 2004.
    • N. Weaver and D. Ellis, "Reflections on the Witty Worm: Analyzing the Attacker," -,login: The USENIX Magazine, vol. 29, no. 3, pp. 34-37, June 2004.
  • 7
    • 28044469549 scopus 로고    scopus 로고
    • The monitoring and early detection of Internet worms
    • October
    • C. C. Zou, W. Gong, D. Towsley, and L. Gao, "The monitoring and early detection of Internet worms," IEEE/ACM Transactions on Networking, vol. 13, no. 5, pp. 961-974, October 2005.
    • (2005) IEEE/ACM Transactions on Networking , vol.13 , Issue.5 , pp. 961-974
    • Zou, C.C.1    Gong, W.2    Towsley, D.3    Gao, L.4
  • 8
    • 28044457069 scopus 로고    scopus 로고
    • Network telescopes
    • Technical report, Cooperative Association for Internet Data Analysis (CAIDA) Technical Report
    • D. Moore, C. Shannon, G. Voelker, and S. Savage, "Network telescopes: Technical report," 2004, Cooperative Association for Internet Data Analysis (CAIDA) Technical Report.
    • (2004)
    • Moore, D.1    Shannon, C.2    Voelker, G.3    Savage, S.4
  • 9
    • 34748825897 scopus 로고    scopus 로고
    • P2P systems for worm detection
    • Piscataway, NJ, USA, September
    • J. Sandin, "P2P systems for worm detection," in DIMACS Workshop on large scale attacks, Piscataway, NJ, USA, September 2003.
    • (2003) DIMACS Workshop on large scale attacks
    • Sandin, J.1
  • 11
    • 0000660738 scopus 로고
    • Strong approximation theorems for density dependent ma-rkov chains
    • T. G. Kurtz, "Strong approximation theorems for density dependent ma-rkov chains," Stochastic Processes and their Applications, vol. 6, pp. 223-240, 1978.
    • (1978) Stochastic Processes and their Applications , vol.6 , pp. 223-240
    • Kurtz, T.G.1
  • 16
    • 0042474227 scopus 로고    scopus 로고
    • Modeling the spread of active worms
    • San Franciso, CA, USA, April
    • Z. Chen, L. Gao, and K. Kwiat, "Modeling the spread of active worms," in Proceedings of IEEE INFOCOM 2003, San Franciso, CA, USA, April 2003.
    • (2003) Proceedings of IEEE INFOCOM 2003
    • Chen, Z.1    Gao, L.2    Kwiat, K.3
  • 17
    • 33646150900 scopus 로고    scopus 로고
    • On the Performance of Internet Worm Scanning Strategies
    • July
    • C. Zou, D. Towsley, and W. Gong, "On the Performance of Internet Worm Scanning Strategies," Elsevier Journal of Performance Evaluation, vol. 63, no. 7, pp. 700-723, July 2006.
    • (2006) Elsevier Journal of Performance Evaluation , vol.63 , Issue.7 , pp. 700-723
    • Zou, C.1    Towsley, D.2    Gong, W.3
  • 19
    • 34748865726 scopus 로고    scopus 로고
    • Coupled Kermack-McKendrick model for randomly scanning worms
    • Sicily, Italy, February
    • G. Kesidis, I. Hamadeh, and S. Jiwasurat, "Coupled Kermack-McKendrick model for randomly scanning worms ," in Proceedings of QoS-IP, Sicily, Italy, February 2005.
    • (2005) Proceedings of QoS-IP
    • Kesidis, G.1    Hamadeh, I.2    Jiwasurat, S.3
  • 22
    • 84948951525 scopus 로고    scopus 로고
    • Throttling Viruses: Restricting Propagation to Defeat Malicious Mobile Code
    • Las Vegas, NV, USA
    • M. Williamson, "Throttling Viruses: Restricting Propagation to Defeat Malicious Mobile Code," in Proceedings of the ASAC Security Conference, Las Vegas, NV, USA, 2002.
    • (2002) Proceedings of the ASAC Security Conference
    • Williamson, M.1
  • 25
    • 24144496767 scopus 로고    scopus 로고
    • Modeling and performance analysis of BitTorrent-like peer-to-peer networks
    • Portland, Oregon, USA, August
    • D. Qiu and R. Srikant, "Modeling and performance analysis of BitTorrent-like peer-to-peer networks," in Proceedings of the ACM SIGCOMM, Portland, Oregon, USA, August 2004.
    • (2004) Proceedings of the ACM SIGCOMM
    • Qiu, D.1    Srikant, R.2
  • 26
    • 33750376884 scopus 로고    scopus 로고
    • Coupon Replication Systems
    • Banff, Alberta, Canada, June
    • L. Massoulie and M. Vojnovic, "Coupon Replication Systems," in ACM Sigmetrics 2005, Banff, Alberta, Canada, June 2005.
    • (2005) ACM Sigmetrics 2005
    • Massoulie, L.1    Vojnovic, M.2
  • 29
    • 34748876279 scopus 로고    scopus 로고
    • B. Cohen, Incentives to build robustness in BitTorrent, 2003, documentation from BitTorrent: http://www.bittorrent.com.
    • B. Cohen, "Incentives to build robustness in BitTorrent," 2003, documentation from BitTorrent: http://www.bittorrent.com.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.