메뉴 건너뛰기




Volumn , Issue , 2007, Pages 61-68

A feasibility study on defending against ultra-fast topological worms

Author keywords

[No Author keywords available]

Indexed keywords

CONNECTED DOMINATING SETS; DATA SERVICES; FEASIBILITY STUDIES; IMMINENT THREATS; OVERLAY GRAPHS; P2P OVERLAYS; PEER TO PEERS; SECURITY PATCHES; TOPOLOGY INFORMATIONS; WORM CONTAINMENTS;

EID: 47949103447     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/P2P.2007.4343465     Document Type: Conference Paper
Times cited : (18)

References (24)
  • 1
    • 47949121211 scopus 로고    scopus 로고
    • http://www.symantec.com/avcenter/security/Content/7680.html.
  • 4
    • 47949088102 scopus 로고    scopus 로고
    • B. Anthony and G. Blelloch. http://www.cs.cmu.edu/afs/cs/project/ pscicoguyb/realworld.
    • B. Anthony and G. Blelloch. http://www.cs.cmu.edu/afs/cs/project/ pscicoguyb/realworld.
  • 7
    • 0141639922 scopus 로고    scopus 로고
    • Approximating minimum size weakly-connected dominating sets for clustering mobile ad hoc networks. InACM
    • Y. Chen and A. Liestman. Approximating minimum size weakly-connected dominating sets for clustering mobile ad hoc networks. InACM MOBIHOC'02, 2002.
    • (2002) MOBIHOC'02
    • Chen, Y.1    Liestman, A.2
  • 12
    • 19644369843 scopus 로고    scopus 로고
    • Approximation algorithm for connected dominating sets
    • Apr
    • S. Guha and S. Khuller. Approximation algorithm for connected dominating sets. In Algorithmica, Apr. 1998.
    • (1998) Algorithmica
    • Guha, S.1    Khuller, S.2
  • 13
    • 0032131147 scopus 로고    scopus 로고
    • A fast and high quality multilevel scheme for partitioning irregular graphs
    • G. Karypis and V. Kumar. A fast and high quality multilevel scheme for partitioning irregular graphs. In SIAM Journal on Scientific Computing, 1998.
    • (1998) SIAM Journal on Scientific Computing
    • Karypis, G.1    Kumar, V.2
  • 16
    • 47949104148 scopus 로고    scopus 로고
    • A self-repairing p2p system resilient to dynamic adversarial churn
    • F. Kuhn, S. Schmid, and R. Wattenhofer. A self-repairing p2p system resilient to dynamic adversarial churn. In OSDI'02, 2002.
    • (2002) OSDI'02
    • Kuhn, F.1    Schmid, S.2    Wattenhofer, R.3
  • 17
    • 0029205669 scopus 로고
    • Fast distributed construction of k-dominating sets and applications
    • S. Kutten and D. Peleg. Fast distributed construction of k-dominating sets and applications. In PODC'95, 1995.
    • (1995) PODC'95
    • Kutten, S.1    Peleg, D.2
  • 18
    • 31844441738 scopus 로고    scopus 로고
    • On the effectiveness of automatic patching
    • M.Vojnovic and A. Ganesh. On the effectiveness of automatic patching. In WORM'05, 2005.
    • (2005) WORM'05
    • Vojnovic, M.1    Ganesh, A.2
  • 19
    • 0038742218 scopus 로고    scopus 로고
    • Mapping the gnutella network: Properties of large-scale peer-to-peer systems and implications for system design
    • M. Ripeanu, I. Foster, and A. Iamnitchi. Mapping the gnutella network: Properties of large-scale peer-to-peer systems and implications for system design. In IEEE Internet Computing Journal, 2002.
    • (2002) IEEE Internet Computing Journal
    • Ripeanu, M.1    Foster, I.2    Iamnitchi, A.3
  • 20
    • 84878711344 scopus 로고    scopus 로고
    • Characterizing unstructured overlay topologies in modern p2p file-sharing systems
    • D. Stutzbach, R. Rejaie, and S. Sen. Characterizing unstructured overlay topologies in modern p2p file-sharing systems. In Internet Measurement Conference, 2005.
    • (2005) Internet Measurement Conference
    • Stutzbach, D.1    Rejaie, R.2    Sen, S.3
  • 21
    • 47949091831 scopus 로고    scopus 로고
    • H. Wang and et al. Shield: Vulnerability-driven network filters for preventing know vulnerability exploits. InACM SIGCOMM, 2004.
    • H. Wang and et al. Shield: Vulnerability-driven network filters for preventing know vulnerability exploits. InACM SIGCOMM, 2004.
  • 24
    • 33746562303 scopus 로고    scopus 로고
    • A first look at peer-to-peer worms: Threats and denfenses
    • L. Zhou and et al. A first look at peer-to-peer worms: threats and denfenses. In IPTPS'05, 2005.
    • (2005) IPTPS'05
    • Zhou, L.1    and et, al.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.