메뉴 건너뛰기




Volumn 46, Issue 7, 2009, Pages 1110-1116

Modeling and analysis of divide-and-rule-hybrid-benign worms

Author keywords

Divide and rule hybrid benign worm; Malcode; Network security; Two factor model; Worm modeling

Indexed keywords

ACTIVE DEFENSE; ANTI-WORM; DIVIDE-AND-RULE-HYBRID-BENIGN WORM; MALCODE; MALICIOUS WORM; MODELING AND ANALYSIS; PROPAGATION MODELS; TWO-FACTOR MODEL; WORM MODELING;

EID: 67650528765     PISSN: 10001239     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (9)

References (14)
  • 6
    • 14944367812 scopus 로고    scopus 로고
    • WORM vs WORM: Preliminary study of an active counter-attack mechanism
    • Stamford S., New York: ACM
    • Castaneda Frank, Sezery Emre Can, Xu Jun. WORM vs WORM: Preliminary study of an active counter-attack mechanism[C]//Stamford S. Proc of the ACM CCS Workshop on Rapid Malcode (WORM 2003). New York: ACM, 2004: 83-93
    • (2004) Proc of the ACM CCS Workshop on Rapid Malcode (WORM 2003) , pp. 83-93
    • Frank, C.1    Can, S.E.2    Xu, J.3
  • 8
    • 34047267176 scopus 로고    scopus 로고
    • Anti-worm based on hybrid confronting technology
    • Chinese source
    • Wang Chao, Qing Sihan, He Jianbo. Anti-worm based on hybrid confronting technology[J]. Journal on Communications, 2007, 28(1): 28-34 (in Chinese)
    • (2007) Journal on Communications , vol.28 , Issue.1 , pp. 28-34
    • Wang, C.1    Qing, S.2    He, J.3
  • 9
    • 85084162258 scopus 로고    scopus 로고
    • How to own the Internet in your spare time
    • Boneh D., San Francisco: USENIX Association
    • Stamford S, Paxson V, Weaver N. How to own the Internet in your spare time[C/OL]//Boneh D. Proc of the 11th Usenix Security Symp. San Francisco: USENIX Association, 2002[2009-01-13]. http://www.icir.org/vern/papers/cdc-usenix-sec02/cdc.pdf
    • (2002) Proc of the 11th Usenix Security Symp
    • Stamford, S.1    Paxson, V.2    Weaver, N.3
  • 11
    • 0042474227 scopus 로고    scopus 로고
    • Modeling the spread of active worms
    • Piscataway, NJ: IEEE
    • Chen Z, Gao L, Kwiat K. Modeling the spread of active worms[C]//Proc of the IEEE INFOCOM 2003. Piscataway, NJ: IEEE, 2003: 1890-1900
    • (2003) Proc of the IEEE INFOCOM 2003 , pp. 1890-1900
    • Chen, Z.1    Gao, L.2    Kwiat, K.3
  • 12
    • 8644261522 scopus 로고    scopus 로고
    • Research and development of Internet worms
    • Chinese source
    • Wen Weiping, Qing Sihan, Jiang Jianchun, et al. Research and development of Internet worms[J]. Journal of Software, 2004, 15(8): 1208-1219 (in Chinese)
    • (2004) Journal of Software , vol.15 , Issue.8 , pp. 1208-1219
    • Wen, W.1    Qing, S.2    Jiang, J.3
  • 13
    • 33646386296 scopus 로고    scopus 로고
    • Modeling and analysis on the interaction between the Internet worm and anti-worm
    • Chinese source
    • Li Xing, Yang Feng, Duan Haixin. Modeling and analysis on the interaction between the Internet worm and anti-worm[J]. Science in China: Ser E Information Sciences, 2004, 34(8): 841-856 (in Chinese)
    • (2004) Science in China: Ser E Information Sciences , vol.34 , Issue.8 , pp. 841-856
    • Li, X.1    Yang, F.2    Duan, H.3
  • 14
    • 34447121211 scopus 로고    scopus 로고
    • Modeling and analysis of active benign worms and hybrid benign worms countering against worms
    • Chinese source
    • Zhou Hanxun, Zhao Hong. Modeling and analysis of active benign worms and hybrid benign worms countering against worms[J]. Journal of Computer Research and Development, 2007, 44(6): 958-964 (in Chinese)
    • (2007) Journal of Computer Research and Development , vol.44 , Issue.6 , pp. 958-964
    • Zhou, H.1    Zhao, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.