메뉴 건너뛰기




Volumn E92-D, Issue 5, 2009, Pages 799-809

Concept, characteristics and defending mechanism of worms

Author keywords

Email worm; IM worm; Internet worms; P2P worm; Worm containment; Worm detection

Indexed keywords

COMPUTER WORMS; ELECTRONIC MAIL; NETWORK SECURITY;

EID: 71849119546     PISSN: 09168532     EISSN: 17451361     Source Type: Journal    
DOI: 10.1587/transinf.E92.D.799     Document Type: Article
Times cited : (15)

References (63)
  • 4
    • 26844507894 scopus 로고    scopus 로고
    • Routing worm: A fast, selective attack worm based on ip address information
    • Washington D. C.
    • C. C. Zou, D. Towsley, W. Gong, and S. Cai, "Routing worm: A fast, selective attack worm based on ip address information, " Proc. PADS '05, pp. 199-206, Washington D. C., 2005.
    • (2005) Proc. PADS '05 , pp. 199-206
    • Zou, C.C.1    Towsley, D.2    Gong, W.3    Cai, S.4
  • 8
    • 38149093160 scopus 로고    scopus 로고
    • Emulation-based detection of non-self-contained polymorphic shellcode
    • M. Polychronakis, K. G. Anagnostakis, and E. P. Markatos, "Emulation-based detection of non-self-contained polymorphic shellcode, " RAID, pp. 87-106, 2007.
    • (2007) RAID , pp. 87-106
    • Polychronakis, M.1    Anagnostakis, K.G.2    Markatos, E.P.3
  • 11
    • 77953145744 scopus 로고    scopus 로고
    • A survey of internet worm detection and containment
    • P. Li, M. Salour, and X. Su, "A survey of internet worm detection and containment, " IEEE Communications Surveys and Tutorials, vol. 10, no. 1, pp. 20-35, 2008.
    • (2008) IEEE Communications Surveys and Tutorials , vol.10 , Issue.1 , pp. 20-35
    • Li, P.1    Salour, M.2    Su, X.3
  • 14
    • 35048867316 scopus 로고    scopus 로고
    • On the design and use of internet sinks for network abuse monitoring
    • V. Yegneswaran, P. Barford, and D. Plonka, "On the design and use of internet sinks for network abuse monitoring, " Proc. RAID, pp. 146-165, 2004.
    • (2004) Proc. RAID , pp. 146-165
    • Yegneswaran, V.1    Barford, P.2    Plonka, D.3
  • 21
    • 0037661195 scopus 로고    scopus 로고
    • Network traffic anomaly detection based on packet bytes
    • SAC '03
    • M. V. Mahoney, "Network traffic anomaly detection based on packet bytes, " SAC '03: Proc. 2003 ACM Symposium on Applied Computing, pp. 346-350, 2003.
    • (2003) Proc. 2003 ACM Symposium on Applied Computing , pp. 346-350
    • Mahoney, M.V.1
  • 22
    • 33750335757 scopus 로고    scopus 로고
    • Anagram: A content anomaly detector resistant to mimicry attack
    • K. Wang, J. J. Parekh, and S. J. Stolfo, "Anagram: A content anomaly detector resistant to mimicry attack, " RAID, pp. 226-248, 2006.
    • (2006) RAID , pp. 226-248
    • Wang, K.1    Parekh, J.J.2    Stolfo, S.J.3
  • 25
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • J. Newsome and D. Song, "Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software, " 12th Annual Network and Distributed System Security Symposium, 2005.
    • (2005) 12th Annual Network and Distributed System Security Symposium
    • Newsome, J.1    Song, D.2
  • 27
    • 33745800070 scopus 로고    scopus 로고
    • Fast and automated generation of attack signatures: A basis for building self-protecting servers
    • Z. Liang and R. Sekar, "Fast and automated generation of attack signatures: A basis for building self-protecting servers, " 12th ACM Conference on Computer and Communications Security, pp. 213-222, 2005.
    • (2005) 12th ACM Conference on Computer and Communications Security , pp. 213-222
    • Liang, Z.1    Sekar, R.2
  • 31
    • 34250362690 scopus 로고    scopus 로고
    • Daw: A distributed antiworm system
    • S. Chen and Y. Tang, "Daw: A distributed antiworm system, " IEEE Trans. Parallel Distrib. Syst., vol. 18, no. 7, pp. 893-906, 2007.
    • (2007) IEEE Trans. Parallel Distrib. Syst. , vol.18 , Issue.7 , pp. 893-906
    • Chen, S.1    Tang, Y.2
  • 34
    • 33750904745 scopus 로고    scopus 로고
    • Implications of peer-to-peer networks on worm attacks and defenses
    • J. K. K. Lakshminarayanan, "Implications of peer-to-peer networks on worm attacks and defenses, " Tech. Rep., UCB, 2003.
    • (2003) Tech. Rep., UCB
    • Lakshminarayanan, J.K.K.1
  • 37
    • 39049092655 scopus 로고    scopus 로고
    • Epidemiological modeling of peer-topeer viruses and pollution
    • R. Thommes and M. Coates, "Epidemiological modeling of peer-topeer viruses and pollution, " INFOCOM'06, 2006.
    • (2006) INFOCOM'06
    • Thommes, R.1    Coates, M.2
  • 39
    • 77950308835 scopus 로고    scopus 로고
    • Modeling and analysis of self-stopping bt worms using dynamic hit list in p2p networks
    • J. Luo, B. Xiao, G. Liu, Q. Xiao, and S. Zhou, "Modeling and analysis of self-stopping bt worms using dynamic hit list in p2p networks, " SSN'09, 2009.
    • (2009) SSN'09
    • Luo, J.1    Xiao, B.2    Liu, G.3    Xiao, Q.4    Zhou, S.5
  • 45
    • 17444431614 scopus 로고    scopus 로고
    • Worm propagation and generic attacks
    • E. Levy, "Worm propagation and generic attacks, " IEEE Security and Privacy, vol. 3, no. 2, pp. 63-65, 2005.
    • (2005) IEEE Security and Privacy , vol.3 , Issue.2 , pp. 63-65
    • Levy, E.1
  • 46
    • 14944350556 scopus 로고    scopus 로고
    • Email virus propagation modeling and analysis
    • Umass ECE Dept.
    • C. Zou, D. Towsley, and W. Gong, "Email virus propagation modeling and analysis, " Tech. Rep., Umass ECE Dept., 2003.
    • (2003) Tech. Rep.
    • Zou, C.1    Towsley, D.2    Gong, W.3
  • 48
    • 35048870863 scopus 로고    scopus 로고
    • Random graphs with arbitrary degree distribution and their applications
    • Santa Fe Institute
    • M. E. J. Newman, S. H. Strogatz, and D. J. Watts, "Random graphs with arbitrary degree distribution and their applications, " Tech. Rep., Santa Fe Institute, 2000.
    • (2000) Tech. Rep.
    • Newman, M.E.J.1    Strogatz, S.H.2    Watts, D.J.3
  • 49
    • 37649029105 scopus 로고    scopus 로고
    • Email networks and the spread of computer viruses
    • M. Newman, S. Forrest, and J. Balthrop, "Email networks and the spread of computer viruses, " Phys. Rev. E, vol. 66, pp. 200-202, 2002.
    • (2002) Phys. Rev. E , vol.66 , pp. 200-202
    • Newman, M.1    Forrest, S.2    Balthrop, J.3
  • 51
    • 14944372409 scopus 로고    scopus 로고
    • Act: Attachment chain tracing scheme for email virus detection and control
    • J. Xiong, "Act: Attachment chain tracing scheme for email virus detection and control, " WORM' 04: Proc. ACM Workshop on Rapid Malcode, 2004.
    • (2004) WORM' 04: Proc. ACM Workshop on Rapid Malcode
    • Xiong, J.1
  • 52
    • 70450140870 scopus 로고    scopus 로고
    • Analyzing behaviorial features for email classification
    • Stanford University, July
    • S. Martin, A. Sewani, B. Nelson, K. Chen, and A. D. Joseph, "Analyzing behaviorial features for email classification, " Proc. CEAS '05, Stanford University, July 2005.
    • (2005) Proc. CEAS '05
    • Martin, S.1    Sewani, A.2    Nelson, B.3    Chen, K.4    Joseph, A.D.5
  • 54
    • 29244474373 scopus 로고    scopus 로고
    • Detecting mass-mailing worm infected hosts by mining dns traffic data
    • K. Ishibashi, T. Toyono, and K. Toyama, "Detecting mass-mailing worm infected hosts by mining dns traffic data, " SIGCOMM05 Workshops, 2005.
    • (2005) SIGCOMM05 Workshops
    • Ishibashi, K.1    Toyono, T.2    Toyama, K.3
  • 56
    • 24644513663 scopus 로고    scopus 로고
    • Feedback email worm defense system for enterprise networks
    • Umass ECE Dept.
    • C. C. Zou, W. Gong, and D. Towsley, "Feedback email worm defense system for enterprise networks, " Tech. Rep., Umass ECE Dept., 2004.
    • (2004) Tech. Rep.
    • Zou, C.C.1    Gong, W.2    Towsley, D.3
  • 63
    • 77950302925 scopus 로고    scopus 로고
    • The feasibility of p2p technique used in im worm
    • Computer Science Dept., Blekinge Institute of Tech.
    • G. Zhang and F. M. Kugblenu, "The feasibility of p2p technique used in im worm, " Tech. Rep., Computer Science Dept., Blekinge Institute of Tech., 2006.
    • (2006) Tech. Rep.
    • Zhang, G.1    Kugblenu, F.M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.