메뉴 건너뛰기




Volumn 3, Issue 1, 2009, Pages 96-107

Passive benign worm propagation modeling with dynamic quarantine defense

Author keywords

Modeling; Passive benign worm; Propagation; Quarantine; Worm attack

Indexed keywords


EID: 66549105472     PISSN: None     EISSN: 19767277     Source Type: Journal    
DOI: 10.3837/tiis.2009.01.005     Document Type: Article
Times cited : (28)

References (21)
  • 1
    • 77953145744 scopus 로고    scopus 로고
    • A Survey of Internet Worm Detection and Containment
    • 1st quarter
    • P. Li, M. Salour, and X. Su, "A Survey of Internet Worm Detection and Containment," IEEE Communications Surveys & Tutorials, vol. 10, no. 1, pp. 20-35, 1st quarter, 2008.
    • (2008) IEEE Communications Surveys & Tutorials , vol.10 , Issue.1 , pp. 20-35
    • Li, P.1    Salour, M.2    Su, X.3
  • 3
    • 66549094338 scopus 로고    scopus 로고
    • J. Kim, W.O. Wilson, U. Aickelin, and J. McLeod, Cooperative Automated Worm Response and Detection ImmuNe Algorithm (CARDINAL) Inspired by T-cell Immunity and Tolerance, Proc. Int'l Conf. on Artificial Immune Systems, LNCS 3627, Banff, Canada, 2007.
    • J. Kim, W.O. Wilson, U. Aickelin, and J. McLeod, "Cooperative Automated Worm Response and Detection ImmuNe Algorithm (CARDINAL) Inspired by T-cell Immunity and Tolerance," Proc. Int'l Conf. on Artificial Immune Systems, LNCS 3627, Banff, Canada, 2007.
  • 4
    • 17444402134 scopus 로고    scopus 로고
    • J. Kim, S. Radhakrishnan, and S.K. Dhall, Measurement and Analysis of Worm Propagation on Internet Network Topology, Proc. Int'l Conf. on Computer Communications and Networks (ICCCN'04), pp. 495-500, Chicago, Oct. 2004.
    • J. Kim, S. Radhakrishnan, and S.K. Dhall, "Measurement and Analysis of Worm Propagation on Internet Network Topology," Proc. Int'l Conf. on Computer Communications and Networks (ICCCN'04), pp. 495-500, Chicago, Oct. 2004.
  • 5
    • 14944367812 scopus 로고    scopus 로고
    • F. Castaneda, E.C. Sezer, and J. Xu, Worm vs. Worm: Preliminary Study of an Active Counter-Attack Mechanism, Proc. 2003 ACM Workshop on Rapid Malcode (WORM'04), pp. 83-93, Washington, DC, Oct. 2004.
    • F. Castaneda, E.C. Sezer, and J. Xu, "Worm vs. Worm: Preliminary Study of an Active Counter-Attack Mechanism," Proc. 2003 ACM Workshop on Rapid Malcode (WORM'04), pp. 83-93, Washington, DC, Oct. 2004.
  • 7
    • 39449122187 scopus 로고    scopus 로고
    • Optimal Internet Worm Treatment Strategy Based on the Two-Factor Model
    • Feb
    • X. Yan and Y. Zou, "Optimal Internet Worm Treatment Strategy Based on the Two-Factor Model," ETRI Journal, vol. 30, no. 1, pp. 81-88, Feb. 2008.
    • (2008) ETRI Journal , vol.30 , Issue.1 , pp. 81-88
    • Yan, X.1    Zou, Y.2
  • 8
    • 34948870917 scopus 로고    scopus 로고
    • H. Zhou, Y. Wen, and H. Zhao, Modeling and Analysis of Active Benign Worms and Hybrid Benign Worms Containing the Spread of Worms, Proc. IEEE Int'l Conf. on Networking (ICN'07), 2007.
    • H. Zhou, Y. Wen, and H. Zhao, "Modeling and Analysis of Active Benign Worms and Hybrid Benign Worms Containing the Spread of Worms," Proc. IEEE Int'l Conf. on Networking (ICN'07), 2007.
  • 9
    • 0042474227 scopus 로고    scopus 로고
    • Modeling the Spread of Active Worms
    • Z. Chen, L. Gao, and K. Kwiat, "Modeling the Spread of Active Worms," Proc. IEEE INFOCOM, vol. 3, pp. 1890-1900, 2003.
    • (2003) Proc. IEEE INFOCOM , vol.3 , pp. 1890-1900
    • Chen, Z.1    Gao, L.2    Kwiat, K.3
  • 10
    • 3042542433 scopus 로고    scopus 로고
    • R. Dantu, J. Cangussu, and A. Yelimeli, Dynamic Control of Worm Propagation, Proc. Int'l Conf. Information Technology: Coding and Computing (ITCC), 2004.
    • R. Dantu, J. Cangussu, and A. Yelimeli, "Dynamic Control of Worm Propagation," Proc. Int'l Conf. Information Technology: Coding and Computing (ITCC), 2004.
  • 11
    • 33750064843 scopus 로고    scopus 로고
    • Cost Optimization in SIS Model of Worm Infection
    • J. Kim, S. Radhakrishnan, and J. Jang, "Cost Optimization in SIS Model of Worm Infection," ETRI Journal, vol. 28, no. 5, pp. 692-695, 2006.
    • (2006) ETRI Journal , vol.28 , Issue.5 , pp. 692-695
    • Kim, J.1    Radhakrishnan, S.2    Jang, J.3
  • 13
    • 0141762461 scopus 로고    scopus 로고
    • D. Moore, C. Shannon, and J. Brown, Code Red: a Case Study on the Spread and Victims of an Internet Worm, Proc. 2nd ACM SIGCOMM Workshop on Internet Measurement, Marseille, France, Nov. 2002.
    • D. Moore, C. Shannon, and J. Brown, "Code Red: a Case Study on the Spread and Victims of an Internet Worm," Proc. 2nd ACM SIGCOMM Workshop on Internet Measurement, Marseille, France, Nov. 2002.
  • 18
    • 84943680959 scopus 로고
    • Computers and Epidemiology
    • J.O. Kephart, D.M. Chess, and S.R. White, "Computers and Epidemiology," IEEE Spectrum, vol. 30, no. 5, pp. 20-26, 1993.
    • (1993) IEEE Spectrum , vol.30 , Issue.5 , pp. 20-26
    • Kephart, J.O.1    Chess, D.M.2    White, S.R.3
  • 19
    • 0042474173 scopus 로고    scopus 로고
    • Internet Quarantine: Requirements for Containing Self-Propagating Code
    • San Franciso, Mar.-Apr
    • D. Moore, C. Shannon, G. M. Voelker, and S. Savage, "Internet Quarantine: Requirements for Containing Self-Propagating Code," Proc. IEEE INFOCOM, San Franciso, vol. 3, pp. 1901-1910, Mar.-Apr. 2003.
    • (2003) Proc. IEEE INFOCOM , vol.3 , pp. 1901-1910
    • Moore, D.1    Shannon, C.2    Voelker, G.M.3    Savage, S.4
  • 20
    • 14944368398 scopus 로고    scopus 로고
    • C.C. Zou, W. Gong, and D. Towsley, Worm Propagation Modeling and Analysis under Dynamic Quarantine Defense, Proc. 2003 ACM Workshop on Rapid Malcode (WORM'03), Washington, DC, Oct. 2003.
    • C.C. Zou, W. Gong, and D. Towsley, "Worm Propagation Modeling and Analysis under Dynamic Quarantine Defense," Proc. 2003 ACM Workshop on Rapid Malcode (WORM'03), Washington, DC, Oct. 2003.
  • 21
    • 66549102203 scopus 로고    scopus 로고
    • H. Zhou, Y. Wen, and H. Zhao, Passive Worm Propagation Modeling and Analysis, Proc. IEEE Int'l Conf. on Computing in the Global Information Technology, Guadelope, French Caribbean, pp. 32, Mar. 2007.
    • H. Zhou, Y. Wen, and H. Zhao, "Passive Worm Propagation Modeling and Analysis," Proc. IEEE Int'l Conf. on Computing in the Global Information Technology, Guadelope, French Caribbean, pp. 32, Mar. 2007.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.