메뉴 건너뛰기




Volumn , Issue , 2008, Pages 32-40

Sybil attacks as a mitigation strategy against the storm botnet

Author keywords

[No Author keywords available]

Indexed keywords

BOTNETS; COMMAND AND CONTROLS; DISRUPTION METHODS; FAKE NODES; INFRA STRUCTURES; MITIGATION STRATEGIES; P2P NETWORKS; P2P PROTOCOLS; PEER TO PEERS; SIMULATION STUDIES; SYBIL ATTACKS;

EID: 58149094016     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MALWARE.2008.4690855     Document Type: Conference Paper
Times cited : (47)

References (32)
  • 1
    • 58149103021 scopus 로고    scopus 로고
    • P-M. Bureau and A. Lee, Malware storms: a global climate change, Virus Bulletin www.virusbtn.com, November 2007.
    • P-M. Bureau and A. Lee, "Malware storms: a global climate change," Virus Bulletin www.virusbtn.com, November 2007.
  • 3
    • 70350241605 scopus 로고    scopus 로고
    • February 2007
    • J. Stewart, "Storm worm DDoS attack," http://www.secureworks. com/ research/threats/storm-worm, February 2007.
    • Storm worm DDoS attack
    • Stewart, J.1
  • 4
    • 58149096308 scopus 로고    scopus 로고
    • Expert: Botnets no. 1 emerging Internet threat
    • CNN Technology news, January
    • "Expert: Botnets no. 1 emerging Internet threat," CNN Technology news, www.Cnn.com/2006/TECH/internet/01/31/furst/, January 2006.
    • (2006)
  • 5
    • 58149102489 scopus 로고    scopus 로고
    • The botnet trackers
    • Washington Post Technology news, February
    • "The botnet trackers," Washington Post Technology news, www.washingtonpost.com/wp-dyn/content/article/2006/02/16/AR200602l601388.html, February 2006.
    • (2006)
  • 6
    • 58149083658 scopus 로고    scopus 로고
    • Attack of the zombie computers is growing threat
    • The New York Times Technology news, nytimes.com, January
    • "Attack of the zombie computers is growing threat," The New York Times Technology news, nytimes.com, January 2007.
    • (2007)
  • 9
    • 58149100231 scopus 로고    scopus 로고
    • 2008 internet malware trends: Storm and the future of social engineering
    • CISCO and IronPort, "2008 internet malware trends: Storm and the future of social engineering," www.ironport.com/malwaretrends, 2008.
    • (2008)
    • CISCO1    IronPort2
  • 10
    • 58149089682 scopus 로고    scopus 로고
    • Storm significantly weekens & web-based malware on the rise
    • MessageLabs Intelligence:, April
    • MessageLabs, "Storm significantly weekens & web-based malware on the rise," MessageLabs Intelligence: www.messagelabs.com/mlireport/MLI- Report-April-2008.pdf, April 2008.
    • (2008)
  • 17
    • 0038483826 scopus 로고    scopus 로고
    • Emergence of scaling in random networks
    • A. L. Barabási and R. Albert, "Emergence of scaling in random networks," Science, vol. 286, pp. 509-512, 1999.
    • (1999) Science , vol.286 , pp. 509-512
    • Barabási, A.L.1    Albert, R.2
  • 18
    • 58149100562 scopus 로고    scopus 로고
    • March 2001
    • "Gnutella," http://www.gnutella.com, March 2001.
  • 19
    • 0001540595 scopus 로고
    • On random graphs I
    • P. Erdös and A. Rényi, "On random graphs I," Publ. Math., vol. 15, pp. 290-297, 1959.
    • (1959) Publ. Math , vol.15 , pp. 290-297
    • Erdös, P.1    Rényi, A.2
  • 20
    • 58149094732 scopus 로고    scopus 로고
    • Measuring large overlay networks the overnet example
    • May
    • K. Kutznet and T. Fuhrmann, "Measuring large overlay networks the overnet example." in KiVS, May 2006.
    • (2006) KiVS
    • Kutznet, K.1    Fuhrmann, T.2
  • 25
    • 49949109773 scopus 로고    scopus 로고
    • Know your enemy: Fast-flux service networks
    • Honeynet Project, July
    • "Know your enemy: Fast-flux service networks," Honeynet Project, www.honeynet.org/papers/honeynet, July 2007.
    • (2007)
  • 26
    • 33244496719 scopus 로고    scopus 로고
    • D. Dumitriu, E. Knightly, A. Kuzmanovic, 1. Stoica, and W. Zwaenepoel, Denial-of-service resilience in peer-to-peer file sharing systems, ACM SIGMETRICS Performance Evaluation Review, 33, pp. 38-49, June 2005.
    • D. Dumitriu, E. Knightly, A. Kuzmanovic, 1. Stoica, and W. Zwaenepoel, "Denial-of-service resilience in peer-to-peer file sharing systems," ACM SIGMETRICS Performance Evaluation Review, vol. 33, pp. 38-49, June 2005.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.