메뉴 건너뛰기




Volumn , Issue , 2007, Pages 65-

Modeling and analysis of active benign worms and hybrid benign worms containing the spread of worms

Author keywords

Benign worm; Network security; Two factor worm model

Indexed keywords

COMPUTER SIMULATION; ELECTRONIC CRIME COUNTERMEASURES; MATHEMATICAL MODELS; NETWORK SECURITY; TIME DELAY;

EID: 34948870917     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICN.2007.58     Document Type: Conference Paper
Times cited : (18)

References (18)
  • 1
    • 34948827892 scopus 로고    scopus 로고
    • D. Moore, C. Shannon, and J. Brown. Code-Red: a case study on the spread and victims of an Internet worm. In Proceedings of the second ACM SIGCOMM Workshop on Internet Measurement, November 2002.
    • D. Moore, C. Shannon, and J. Brown. Code-Red: a case study on the spread and victims of an Internet worm. In Proceedings of the second ACM SIGCOMM Workshop on Internet Measurement, November 2002.
  • 3
    • 34948823177 scopus 로고    scopus 로고
    • eEye Digital Security, ANALYSIS: CodeRed II Worm.http://www.eeye.com/ html/Research/Advisories/AL20010804.html
    • eEye Digital Security, ANALYSIS: CodeRed II Worm.http://www.eeye.com/ html/Research/Advisories/AL20010804.html
  • 7
    • 85084163246 scopus 로고    scopus 로고
    • Autograph : Toward automated , distributed worm signature detection
    • San Diego, CA
    • Kim H. , Karp B. . Autograph : Toward automated , distributed worm signature detection. In : Proceedings of the USENIX Security, San Diego, CA, 2004, 271-286.
    • (2004) Proceedings of the USENIX Security , pp. 271-286
    • Kim, H.1    Karp, B.2
  • 9
    • 27544498978 scopus 로고    scopus 로고
    • Newsome J., Karp B., Song D.Polygraph:Automatically generating signatures for polymorphic worms.In:Proceedings of the IEEE S &P 2005, Oakland, California, 2005, 226-241
    • Newsome J., Karp B., Song D.Polygraph:Automatically generating signatures for polymorphic worms.In:Proceedings of the IEEE S &P 2005, Oakland, California, 2005, 226-241
  • 13
    • 24144441166 scopus 로고    scopus 로고
    • G. Kesidis, I. Hamadeh, and S. Jiwasurat. Coupled kermack-mckendrick models for randomly scanning and bandwidth-saturating internet worms. In:Proceedings of 3rd International Workshop on QoS in Multiservice IP Networks QoS-IP, February 2005.101-109.
    • G. Kesidis, I. Hamadeh, and S. Jiwasurat. Coupled kermack-mckendrick models for randomly scanning and bandwidth-saturating internet worms. In:Proceedings of 3rd International Workshop on QoS in Multiservice IP Networks QoS-IP, February 2005.101-109.
  • 17
    • 34948837710 scopus 로고    scopus 로고
    • Markus Kern. Re: Codegreen beta release, http://online.securityfocus.com/ archive/82/211462.
    • Markus Kern. Re: Codegreen beta release, http://online.securityfocus.com/ archive/82/211462.
  • 18
    • 20444443538 scopus 로고    scopus 로고
    • Washington: Prentice Hall Professional Technical Reference
    • Ed Skoudis, Lenny Zeltser Malware: Fighting Malicious Code Washington: Prentice Hall Professional Technical Reference,2003.104-111.
    • (2003) Fighting Malicious Code , pp. 104-111
    • Skoudis, E.1    Zeltser Malware, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.