-
1
-
-
33750372869
-
Toward a model for sources of Internet background radiation
-
Adelaide, Australia, Mar.
-
P. Barford, R. Nowak, R. Willett, and V. Yegneswaran, "Toward a model for sources of Internet background radiation," in Proc. Passive and Active Measurement Conf. (PAM'06), Adelaide, Australia, Mar. 2006.
-
(2006)
Proc. Passive and Active Measurement Conf. (PAM'06)
-
-
Barford, P.1
Nowak, R.2
Willett, R.3
Yegneswaran, V.4
-
2
-
-
34249007032
-
Worm propagation strategies in an IPv6 Internet
-
Feb.
-
S. M. Bellovin, B. Cheswick, and A. Keromytis, "Worm propagation strategies in an IPv6 Internet," Login, vol.31, no.1, pp. 70-76, Feb. 2006.
-
(2006)
Login
, vol.31
, Issue.1
, pp. 70-76
-
-
Bellovin, S.M.1
Cheswick, B.2
Keromytis, A.3
-
3
-
-
33751035317
-
Design space and analysis of worm defense strategies
-
Taipei, Taiwan, Mar.
-
D. Brumley, L. Liu, P. Poosankam, and D. Song, "Design space and analysis of worm defense strategies," in ACM Symp. InformAtion, Computer and Communications Security (ASIACCS), Taipei, Taiwan, Mar. 2006.
-
(2006)
ACM Symp. InformAtion, Computer and Communications Security (ASIACCS)
-
-
Brumley, D.1
Liu, L.2
Poosankam, P.3
Song, D.4
-
5
-
-
36348997064
-
Understanding localized-scanning worms
-
New Orleans, LA, Apr.
-
Z. Chen, C. Chen, and C. Ji, "Understanding localized-scanning worms," in Proc. 26th IEEE Int. Performance Computing and Communications Conf. (IPCCC'07), New Orleans, LA, Apr. 2007, pp. 186-193.
-
(2007)
Proc. 26th IEEE Int. Performance Computing and Communications Conf. (IPCCC'07)
, pp. 186-193
-
-
Chen, Z.1
Chen, C.2
Ji, C.3
-
6
-
-
0042474227
-
Modeling the spread of active worms
-
San Francisco, CA, Apr.
-
Z. Chen, L. Gao, and K. Kwiat, "Modeling the spread of active worms," in Proc. INFOCOM'03, San Francisco, CA, Apr. 2003, vol.3, pp. 1890-1900.
-
(2003)
Proc. INFOCOM'03
, vol.3
, pp. 1890-1900
-
-
Chen, Z.1
Gao, L.2
Kwiat, K.3
-
8
-
-
34548366188
-
Optimal worm-scanning method using vulnerable-host distributions
-
Z.Chen and C.Ji, "Optimal worm-scanning method using vulnerable-host distributions," Int. J. Security Netw., Special Issue on Comput. Netw. Security, Vol.2, no. 1/2, pp.71-80, 2007
-
(2007)
Int. J. Security Netw., Special Issue on Comput. Netw. Security
, vol.2
, Issue.1-2
, pp. 71-80
-
-
Chen, Z.1
Ji, C.2
-
9
-
-
34548324846
-
Measuring network-aware worm spreading ability
-
Anchorage, AK, May
-
Z. Chen and C. Ji, "Measuring network-aware worm spreading ability," in Proc. INFOCOM'07, Anchorage, AK, May 2007.
-
(2007)
Proc. INFOCOM'07
-
-
Chen, Z.1
Ji, C.2
-
10
-
-
31844443075
-
A self-learning worm using importance scanning
-
Fairfax, VA, Nov.
-
Z. Chen and C. Ji, "A self-learning worm using importance scanning," in Proc. ACM/CCS Workshop Rapid Malcode (WORM'05), Fairfax, VA, Nov. 2005, pp. 22-29.
-
(2005)
Proc. ACM/CCS Workshop Rapid Malcode (WORM'05)
, pp. 22-29
-
-
Chen, Z.1
Ji, C.2
-
11
-
-
51349126234
-
Spatial-temporal characteristics of malicious sources
-
Phoenix, AZ, Apr.
-
Z. Chen, C. Ji, and P. Barford, "Spatial-temporal characteristics of malicious sources," in Proc. INFOCOM'08 Mini-Conf., Phoenix, AZ, Apr. 2008.
-
(2008)
Proc. INFOCOM'08 Mini-Conf.
-
-
Chen, Z.1
Ji, C.2
Barford, P.3
-
12
-
-
84926662675
-
Nearest neighbor pattern classification
-
Jan.
-
T. M. Cover and P. E. Hart, "Nearest neighbor pattern classification," IEEE Trans. Inf. Theory, vol.IT-13, no.1, pp. 21-27, Jan. 1967.
-
(1967)
IEEE Trans. Inf. Theory
, vol.IT-13
, Issue.1
, pp. 21-27
-
-
Cover, T.M.1
Hart, P.E.2
-
14
-
-
25644446918
-
The effect of DNS delays on worm propagation in an IPv6 Internet
-
Miami, FL, Mar.
-
H. Feng, A. Kamra, V. Misra, and A. D. Keromytis, "The effect of DNS delays on worm propagation in an IPv6 Internet," in Proc. IN-FOCOM'05, Miami, FL, Mar. 2005, vol.4, pp. 2405-2414.
-
(2005)
Proc. IN-FOCOM'05
, vol.4
, pp. 2405-2414
-
-
Feng, H.1
Kamra, A.2
Misra, V.3
Keromytis, A.D.4
-
15
-
-
51349154278
-
Misleading and defeating importance-scanning malware propagation
-
Nice, France, Sep.
-
G. Gu, Z. Chen, P. Porras, and W. Lee, "Misleading and defeating importance-scanning malware propagation," in Proc. 3rd Int. Conf. Security Privacy in Communication Networks (SecureComm '07), Nice, France, Sep. 2007.
-
(2007)
Proc. 3rd Int. Conf. Security Privacy in Communication Networks (SecureComm '07)
-
-
Gu, G.1
Chen, Z.2
Porras, P.3
Lee, W.4
-
16
-
-
21644482790
-
Worm detection, early warning and response based on local victim information
-
Tucson, AZ, Dec.
-
G. Gu, M. Sharif, X. Qin, D. Dagon, W. Lee, and G. Riley, "Worm detection, early warning and response based on local victim information," in Proc. 20th Ann. Computer Security Applications Conf. (ACSAC'04), Tucson, AZ, Dec. 2004.
-
(2004)
Proc. 20th Ann. Computer Security Applications Conf. (ACSAC'04)
-
-
Gu, G.1
Sharif, M.2
Qin, X.3
Dagon, D.4
Lee, W.5
Riley, G.6
-
17
-
-
0141650502
-
Observed structure of addresses in IP traffic
-
Marseille, France, Nov.
-
E. Kohler, J. Li, V. Paxson, and S. Shenker, "Observed structure of addresses in IP traffic," in ACM SIGCOMM Internet Measurement Workshop, Marseille, France, Nov. 2002.
-
(2002)
ACM SIGCOMM Internet Measurement Workshop
-
-
Kohler, E.1
Li, J.2
Paxson, V.3
Shenker, S.4
-
18
-
-
0742276097
-
Inside the Slammer worm
-
Jul.
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, "Inside the Slammer worm," IEEE Security Privacy, vol.1, no.4, pp. 33-39, Jul. 2003.
-
(2003)
IEEE Security Privacy
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
19
-
-
0141762461
-
Code-Red: A case study on the spread and victims of an Internet worm
-
Marseille, France, Nov.
-
D. Moore, C. Shannon, and J. Brown, "Code-Red: A case study on the spread and victims of an Internet worm," in ACM SIGCOMM Internet Measurement Workshop, Marseille, France, Nov. 2002.
-
(2002)
ACM SIGCOMM Internet Measurement Workshop
-
-
Moore, D.1
Shannon, C.2
Brown, J.3
-
20
-
-
69749084185
-
-
Tech. Rep. ISI-TR-2004-2598, Nov.
-
Y. Pryadkin, R. Lindell, J. Bannister, and R. Govindan, An Empirical Evaluation of IP Address Space Occupancy, USC/Information Sciences Inst., Tech. Rep. ISI-TR-2004-2598, Nov. 2004.
-
(2004)
An Empirical Evaluation of IP Address Space Occupancy, USC/Information Sciences Inst.
-
-
Pryadkin, Y.1
Lindell, R.2
Bannister, J.3
Govindan, R.4
-
21
-
-
31844452004
-
On the effectiveness of distributed worm monitoring
-
Baltimore, MD, Aug.
-
M. A. Rajab, F. Monrose, and A. Terzis, "On the effectiveness of distributed worm monitoring," in Proc. 14th USENIX Security Symp. (Security'05), Baltimore, MD, Aug. 2005, pp. 225-237.
-
(2005)
Proc. 14th USENIX Security Symp. (Security'05)
, pp. 225-237
-
-
Rajab, M.A.1
Monrose, F.2
Terzis, A.3
-
22
-
-
0001204475
-
Some fundamental questions of information theory
-
Budapest: Akademiai Kiado
-
A. Renyi, "Some fundamental questions of information theory," in Selected Papers of Alfred Renyi. Budapest: Akademiai Kiado, 1976, vol.2, pp. 526-552.
-
(1976)
Selected Papers of Alfred Renyi
, vol.2
, pp. 526-552
-
-
Renyi, A.1
-
25
-
-
4344627335
-
The spread of the Witty worm
-
Jul./Aug.
-
C. Shannon and D. Moore, "The spread of the Witty worm," IEEE Security Privacy, vol.2, no.4, pp. 46-50, Jul./Aug. 2004.
-
(2004)
IEEE Security Privacy
, vol.2
, Issue.4
, pp. 46-50
-
-
Shannon, C.1
Moore, D.2
-
26
-
-
85084162258
-
How to 0wn the Internet in your spare time
-
San Francisco, CA, Aug.
-
S. Staniford, V. Paxson, and N. Weaver, "How to 0wn the Internet in your spare time," in Proc. 11th USENIX Security Symp. (Security'02), San Francisco, CA, Aug. 2002.
-
(2002)
Proc. 11th USENIX Security Symp. (Security'02)
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
-
27
-
-
84860603040
-
Implementing and testing a virus throttle
-
Washington, DC, Aug.
-
J. Twycross and M. M. Williamson, "Implementing and testing a virus throttle," in Proc. 12th USENIX Security Symp. (Security '03), Washington, DC, Aug. 2003, pp. 285-294.
-
(2003)
Proc. 12th USENIX Security Symp. (Security '03)
, pp. 285-294
-
-
Twycross, J.1
Williamson, M.M.2
-
28
-
-
51349085987
-
Sampling strategies for epidemicstyle information dissemination
-
Phoenix, AZ, Apr.
-
M. Vojnovic, V. Gupta, T. Karagiannis, and C. Gkantsidis, "Sampling strategies for epidemic-style information dissemination," in Proc. INFOCOM'08, Phoenix, AZ, Apr. 2008.
-
(2008)
Proc. INFOCOM'08
-
-
Vojnovic, M.1
Gupta, V.2
Karagiannis, T.3
Gkantsidis, C.4
-
29
-
-
14944341848
-
On the design and utility of Internet sinks for network abuse monitoring
-
Sophia Antipolis, France
-
V. Yegneswaran, P. Barford, and D. Plonka, "On the design and utility of Internet sinks for network abuse monitoring," in Proc. Symp. Recent Advances in Intrusion Detection (RAID '04), Sophia Antipolis, France, 2004.
-
(2004)
Proc. Symp. Recent Advances in Intrusion Detection (RAID '04)
-
-
Yegneswaran, V.1
Barford, P.2
Plonka, D.3
-
30
-
-
16344396406
-
Monitoring and early warning for Internet worms
-
Washington, DC, Oct.
-
C. C. Zou, L. Gao, W. Gong, and D. Towsley, "Monitoring and early warning for Internet worms," in 10th ACM Conf. Computer and Communication Security (CCS'03), Washington, DC, Oct. 2003.
-
(2003)
10th ACM Conf. Computer and Communication Security (CCS'03)
-
-
Zou, C.C.1
Gao, L.2
Gong, W.3
Towsley, D.4
-
31
-
-
33646150900
-
On the performance of Internet worm scanning strategies
-
Jul.
-
C. C. Zou, D. Towsley, and W. Gong, "On the performance of Internet worm scanning strategies," Elsevier J. Performance Evaluation, vol.63, no.7, pp. 700-723, Jul. 2006.
-
(2006)
Elsevier J. Performance Evaluation
, vol.63
, Issue.7
, pp. 700-723
-
-
Zou, C.C.1
Towsley, D.2
Gong, W.3
-
32
-
-
33646400816
-
Advanced routing worm and its security challenges
-
C. C. Zou, D. Towsley, W. Gong, and S. Cai, "Advanced routing worm and its security challenges," Simulation: Trans. Soci. Modeling Simulation Int., vol.82, no.1, pp. 75-85, 2006.
-
(2006)
Simulation: Trans. Soci. Modeling Simulation Int.
, vol.82
, Issue.1
, pp. 75-85
-
-
Zou, C.C.1
Towsley, D.2
Gong, W.3
Cai, S.4
-
33
-
-
69749125984
-
-
CERT Advisory CA-2001-2026 Nimda Worm CERT Coordination Center, Dec. [Online]. Available
-
CERT Advisory CA-2001-2026 Nimda Worm CERT Coordination Center, Dec. 2008 [Online]. Available: http://www.cert.org/advi-sories/CA-2001-26.html
-
(2008)
-
-
-
34
-
-
69749112669
-
-
"Code Red II:" Another Worm Exploiting Buffer Overflow in IIS Indexing Service DLL CERT Coordination Center, CERT Incident Note IN-2001-2009, Dec. [Online]. Available
-
"Code Red II:" Another Worm Exploiting Buffer Overflow in IIS Indexing Service DLL CERT Coordination Center, CERT Incident Note IN-2001-2009, Dec. 2008 [Online]. Available: http://www.cert.org/inci-dent-notes/IN-2001 -09 .html
-
(2008)
-
-
-
35
-
-
69749123038
-
-
Distributed Intrusion Detection System (DShield) Dec. [Online]. Available
-
Distributed Intrusion Detection System (DShield) Dec. 2008 [Online]. Available: http://www.dshield.org/
-
(2008)
-
-
-
36
-
-
69749123542
-
-
ALYSIS: Blaster Worm eEye Digital Security, Dec. [Online]. Available
-
ANALYSIS: Blaster Worm eEye Digital Security, Dec. 2008 [Online]. Available: http://research.eeye.com/html/advisories/pub-lished/AL20030811.html
-
(2008)
-
-
-
37
-
-
69749103838
-
-
Internet Protocol V4 Address Space Dec. 2008 [Online]. Available
-
Internet Protocol V4 Address Space Dec. 2008 [Online]. Available: http://www.iana.org/assignments/ipv4-address-space
-
(2008)
-
-
-
38
-
-
69749118914
-
-
Dec. [Online] Available
-
UROULETTE Dec. 2008 [Online]. Available: http://www.uroulette. com/
-
(2008)
-
-
-
39
-
-
69749100100
-
-
Agobot (Computer Worm) Wikipedia Dec. [Online]. Available
-
Agobot (Computer Worm) Wikipedia, Dec. 2008 [Online]. Available: http://en.wikipedia.org/wiki/Agobot-(computer-worm)
-
(2008)
-
-
-
40
-
-
69749091000
-
-
Samy (XSS) Wikipedia Dec. [Online]. Available
-
Samy (XSS) Wikipedia, Dec. 2008 [Online]. Available: http://en. wikipedia.org/wiki/Samy-(XSS)
-
(2008)
-
-
-
41
-
-
69749110997
-
-
Self-Information Wikipedia Dec. [Online]. Available
-
Self-Information Wikipedia, Dec. 2008 [Online]. Available: http://en. wikipedia.org/wiki/Self-information
-
(2008)
-
-
-
42
-
-
70350215415
-
Exploiting network structure for proactive spam mitigation
-
Boston, MA, Aug.
-
S. Venkataraman, S. Sen, O. Spatscheck, P. Haffner, and D. Song, "Exploiting network structure for proactive spam mitigation," in Proc. 16th USENIX Security Symp. (Security '07), Boston, MA, Aug. 2007.
-
(2007)
Proc. 16th USENIX Security Symp. (Security '07)
-
-
Venkataraman, S.1
Sen, S.2
Spatscheck, O.3
Haffner, P.4
Song, D.5
-
43
-
-
36749049364
-
Peer to peer networks for defense against Internet worms
-
Dec.
-
S. Shakkottai and R. Srikant, "Peer to peer networks for defense against Internet worms," IEEE J. Sel. Areas Commun., vol.25, no.9, pp. 1745-1752, Dec. 2007.
-
(2007)
IEEE J. Sel. Areas Commun.
, vol.25
, Issue.9
, pp. 1745-1752
-
-
Shakkottai, S.1
Srikant, R.2
-
44
-
-
54549088710
-
On the race of worms, alerts, and patches
-
Oct.
-
M. Vojnovic and A. J. Ganesh, "On the race of worms, alerts, and patches," IEEE Trans. Netw., vol.16, no.5, pp. 1066-1079, Oct. 2008.
-
(2008)
IEEE Trans. Netw.
, vol.16
, Issue.5
, pp. 1066-1079
-
-
Vojnovic, M.1
Ganesh, A.J.2
|