메뉴 건너뛰기




Volumn , Issue , 2008, Pages 51-58

Understanding divide-conquer-scanning worms

Author keywords

[No Author keywords available]

Indexed keywords

DEFENSE MECHANISMS; FUTURE INTERNETS; INTERNET WORMS; MATHEMATICAL ANALYSIS; NON-UNIFORM DISTRIBUTIONS; RANDOM SCANNING; SCANNING WORMS; SECURITY THREATS;

EID: 62849096861     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PCCC.2008.4745139     Document Type: Conference Paper
Times cited : (12)

References (26)
  • 3
    • 0042474227 scopus 로고    scopus 로고
    • Modeling the spread of active worms
    • San Francisco, CA, Apr
    • Z. Chen, L. Gao, and K. Kwiat, "Modeling the spread of active worms," in Proc. of INFOCOM'03, vol. 3, San Francisco, CA, Apr. 2003, pp. 1890-1900.
    • (2003) Proc. of INFOCOM'03 , vol.3 , pp. 1890-1900
    • Chen, Z.1    Gao, L.2    Kwiat, K.3
  • 5
    • 34548324846 scopus 로고    scopus 로고
    • Measuring network-aware worm spreading ability
    • Anchorage, AK, May
    • Z. Chen and C. Ji, "Measuring network-aware worm spreading ability," in Proc. of INFOCOM'07, Anchorage, AK, May 2007.
    • (2007) Proc. of INFOCOM'07
    • Chen, Z.1    Ji, C.2
  • 6
    • 51349126234 scopus 로고    scopus 로고
    • Spatial-temporal characteristics of malicious sources
    • Phoenix, AZ, Apr
    • Z. Chen, C. Ji, and P. Barford, "Spatial-temporal characteristics of malicious sources," in Proc. of INFOCOM'08 Mini-Conference, Phoenix, AZ, Apr. 2008.
    • (2008) Proc. of INFOCOM'08 Mini-Conference
    • Chen, Z.1    Ji, C.2    Barford, P.3
  • 8
    • 33746603312 scopus 로고    scopus 로고
    • Mining anomalies using traffic feature distributions
    • Philadelphia, PA, Aug
    • A. Lakhina, M. Crovella, and C. Diot, "Mining anomalies using traffic feature distributions," in Proc. of ACM SIGCOMM'05, Philadelphia, PA, Aug. 2005.
    • (2005) Proc. of ACM SIGCOMM'05
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 11
  • 14
    • 4344627335 scopus 로고    scopus 로고
    • The spread of the Witty worm
    • Jul-Aug
    • C. Shannon and D. Moore, "The spread of the Witty worm," IEEE Security and Privacy, vol. 2, no 4, Jul-Aug 2004, pp. 46-50.
    • (2004) IEEE Security and Privacy , vol.2 , Issue.4 , pp. 46-50
    • Shannon, C.1    Moore, D.2
  • 17
    • 51349085987 scopus 로고    scopus 로고
    • Sampling strategies for epidemic-style information dissemination
    • Phoenix, AZ, Apr
    • M. Vojnovic, V. Gupta, T. Karagiannis, and C. Gkantsidis, "Sampling strategies for epidemic-style information dissemination," in Proc. of INFOCOM'08, Phoenix, AZ, Apr. 2008.
    • (2008) Proc. of INFOCOM'08
    • Vojnovic, M.1    Gupta, V.2    Karagiannis, T.3    Gkantsidis, C.4
  • 18
    • 33750248481 scopus 로고    scopus 로고
    • Effective worm detection for various scan techniques
    • J. Xia, S. Vangala, J. Wu, L. Gao, and K. Kwiat, "Effective worm detection for various scan techniques," Journal of Computer Security, vol. 14, no. 4, 2006, pp. 359-387.
    • (2006) Journal of Computer Security , vol.14 , Issue.4 , pp. 359-387
    • Xia, J.1    Vangala, S.2    Wu, J.3    Gao, L.4    Kwiat, K.5
  • 21
    • 33646150900 scopus 로고    scopus 로고
    • On the performance of Internet worm scanning strategies
    • July
    • C. C. Zou, D. Towsley, and W Gong, "On the performance of Internet worm scanning strategies," Elsevier Journal of Performance Evaluation, vol. 63. no. 7, July 2006, pp. 700-723.
    • (2006) Elsevier Journal of Performance Evaluation , vol.63 , Issue.7 , pp. 700-723
    • Zou, C.C.1    Towsley, D.2    Gong, W.3
  • 23
    • 67249087459 scopus 로고    scopus 로고
    • CAIDA
    • CAIDA, "Network telescope," http://www.caida.org/research/ security/telescope/.
    • Network telescope
  • 25
    • 62849126509 scopus 로고    scopus 로고
    • The CAIDA Dataset on the Witty Worm - March 19-24, 2004, Colleen Shannon and David Moore, http://www.caida.org/data/passive/witty-worm-dataset.xml. Support for the Witty Worm Dataset and the UCSD Network Telescope are provided by Cisco Systems, Limelight Networks, the US Department of Homeland Security, the National Science Foundation, DARPA, Digital Envoy, and CAIDA Members.
    • The CAIDA Dataset on the Witty Worm - March 19-24, 2004, Colleen Shannon and David Moore, http://www.caida.org/data/passive/witty-worm-dataset.xml. Support for the Witty Worm Dataset and the UCSD Network Telescope are provided by Cisco Systems, Limelight Networks, the US Department of Homeland Security, the National Science Foundation, DARPA, Digital Envoy, and CAIDA Members.
  • 26
    • 84869250111 scopus 로고    scopus 로고
    • Wikipedia, "Logistic function," http://en.wikipedia.org/wiki/ Logistic-function
    • Logistic function


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.