-
1
-
-
0041065277
-
The Internet Worm Program: An Analysis
-
E. Spafford, "The Internet Worm Program: An Analysis," Comp. Commun. Rev., 1989.
-
(1989)
Comp. Commun. Rev.
-
-
Spafford, E.1
-
2
-
-
26844507894
-
Routing Worm: A Fast, Selective Attack Worm Based on IP Address Information
-
D. T. C. Zou, W. Gong, and S. Cai, "Routing Worm: A Fast, Selective Attack Worm Based on IP Address Information," Proc. 19th ACM/IEEE/SCS Wksp. Principles of Advanced and Distrib. Simulation, 2005.
-
Proc. 19th ACM/IEEE/SCS Wksp. Principles of Advanced and Distrib. Simulation, 2005
-
-
T, D.1
Zou, C.2
Gong, W.3
Cai, S.4
-
6
-
-
14944380936
-
The Top Speed of Flash Worms
-
D. M. S. Staniford, V. Paxson, and N. Weaver, "The Top Speed of Flash Worms," Proc. ACM WORM '04, 2004.
-
Proc. ACM WORM '04, 2004
-
-
M, D.1
Staniford, S.2
Paxson, V.3
Weaver, N.4
-
7
-
-
12244311689
-
A Taxonomy of Computer Worms
-
V. P. N. Weaver, S. Staniford, and R. Cunningham, "A Taxonomy of Computer Worms," Proc. ACM WORM '03, 2003.
-
Proc. ACM WORM '03, 2003
-
-
P, V.1
Weaver, N.2
Staniford, S.3
Cunningham, R.4
-
9
-
-
33746642190
-
Worms and Viruses and Botnets, Oh My! Rational Responses to Emerging Internet Threats
-
G. P. Schaffer, "Worms and Viruses and Botnets, Oh My! Rational Responses to Emerging Internet Threats," IEEE Sec. & Privacy, vol. 4, 2006, pp. 52-58.
-
(2006)
IEEE Sec. & Privacy
, vol.4
, pp. 52-58
-
-
Schaffer, G.P.1
-
10
-
-
34547399387
-
A Multifaceted Approach to Understanding the Botnet Phenomenon
-
J. Z. Moheeb Abu Rajab, F. Monrose, and A. Terzis, "A Multifaceted Approach to Understanding the Botnet Phenomenon," Proc. 6th ACM SIGCOMM on Internet Measurement, 2006.
-
Proc. 6th ACM SIGCOMM on Internet Measurement, 2006
-
-
Z, J.1
Rajab, M.A.2
Monrose, F.3
Terzis, A.4
-
11
-
-
34547143641
-
Internet-Scale Malware Mitigation: Combining Intelligence of the Control and Data Plane
-
E. C. Ying Zhang and Z. Morley Mao, "Internet-Scale Malware Mitigation: Combining Intelligence of the Control and Data Plane," Proc. ACM WORM '06, 2006.
-
Proc. ACM WORM '06, 2006
-
-
C, E.1
Zhang, Y.2
Mao, Z.M.3
-
12
-
-
0742276097
-
Inside the Slammer Worm
-
V. P. D. Moore et al., "Inside the Slammer Worm," IEEE Sec. & Privacy, vol. 1, 2003, pp. 33-39.
-
(2003)
IEEE Sec. & Privacy
, vol.1
, pp. 33-39
-
-
P, V.1
Moore, D.2
-
13
-
-
84872920896
-
-
May
-
D. G. Glazer, "Computer Worms," May 2005, http://www.research. umbc.edu/~dgorin1/is432/worms.htm
-
(2005)
Computer Worms
-
-
Glazer, D.G.1
-
14
-
-
84892600344
-
-
retrieved July 2007
-
"Morris (Computer Worm)," retrieved July 2007, http://en.wikipedia.org/wiki/Morris-worm
-
Morris (Computer Worm)
-
-
-
15
-
-
78651564650
-
-
retrieved July 2007
-
"F-Secure Virus Descriptions: Nimda," retrieved July 2007, http://www.f-secure.com/v-descs/nimda.shtml, 2001
-
(2001)
F-Secure Virus Descriptions: Nimda
-
-
-
16
-
-
0042536297
-
-
retrieved July 2007
-
"CERT" Advisory CA-2001-26 Nimda Worm," retrieved July 2007, http://www.cert.org/advisories/CA-2001-26.html, 2001.
-
(2001)
"CERT" Advisory CA-2001-26 Nimda Worm
-
-
-
21
-
-
4344627335
-
The Spread of the Witty Worm
-
C. S. D. Moore, "The Spread of the Witty Worm," IEEE Sec. & Privacy, vol. 2, 2004, pp. 46-50.
-
(2004)
IEEE Sec. & Privacy
, vol.2
, pp. 46-50
-
-
S, C.1
Moore, D.2
-
22
-
-
84892563548
-
-
2nd ed., Syngress, O'Reilly
-
R. A. et al., Snort 2.1 Intrusion Detection, 2nd ed., Syngress, O'Reilly, 2004, pp. 490-91.
-
(2004)
Snort 2.1 Intrusion Detection
, pp. 490-491
-
-
A, R.1
-
24
-
-
84892587190
-
-
May
-
"Snort," May 2005, http://www.snort.org
-
(2005)
Snort
-
-
-
30
-
-
14844288427
-
Worms vs. Perimeters - The Case for Hard-LANs
-
D. E. N. Weaver, S. Staniford, and V. Paxson, "Worms vs. Perimeters - The Case for Hard-LANs," Proc. 12th Annual IEEE Symp. High Perf. Interconnects, 2004.
-
Proc. 12th Annual IEEE Symp. High Perf. Interconnects, 2004
-
-
E, D.1
Weaver, N.2
Staniford, S.3
Paxson, V.4
-
31
-
-
21644482790
-
Worm Detection, Early Warning and Response Based on Local Victim Information
-
M. S. G. Gu et al., "Worm Detection, Early Warning and Response Based on Local Victim Information," Proc. 20th Annual Comp. Sec. Apps. Conf., 2004.
-
Proc. 20th Annual Comp. Sec. Apps. Conf., 2004
-
-
S, M.1
Gu, G.2
-
35
-
-
84892612179
-
An Efficient Architecture and Algorithm for Detecting Worms with Various Scan Techniques
-
S. V. J. Wu, L. Gao, and K. Kwiat, "An Efficient Architecture and Algorithm for Detecting Worms with Various Scan Techniques," Proc. Network and Distrib. Sys. Sec. Symp., 2004.
-
Proc. Network and Distrib. Sys. Sec. Symp., 2004
-
-
V, S.1
Wu, J.2
Gao, L.3
Kwiat, K.4
-
38
-
-
71249088245
-
-
retrieved Aug. 2005
-
"Honeyd Virtual Honeypot," retrieved Aug. 2005, http://honeyd.org
-
Honeyd Virtual Honeypot
-
-
-
40
-
-
0141441130
-
PHAD: Packet Header Anomaly Detection for Identifying Hostile Network Traffic
-
P. K. C. Matthew V. Mahoney, "PHAD: Packet Header Anomaly Detection for Identifying Hostile Network Traffic," FL Inst. Tech. tech. rep. CS-2001-04, 2001.
-
(2001)
FL Inst. Tech. Tech. Rep. CS-2001-04
-
-
C, P.K.1
Mahoney, M.V.2
-
45
-
-
85084163246
-
Autograph: Toward Automated, Distributed Worm Signature Detection
-
B. K. H. Kim, "Autograph: Toward Automated, Distributed Worm Signature Detection," Proc. 13th USENIX Sec. Symp., 2004.
-
Proc. 13th USENIX Sec. Symp., 2004
-
-
K, B.1
Kim, H.2
-
47
-
-
31844445856
-
Defending Against Hitlist Worms Using Network Address Space Randomization
-
P. A. S. Antonatos, E. P. Markatos, K. G. Anagnostakis, "Defending Against Hitlist Worms Using Network Address Space Randomization," Proc. ACM WORM '05, 2005.
-
Proc. ACM WORM '05, 2005
-
-
A, P.1
Antonatos, S.2
Markatos, E.P.3
Anagnostakis, K.G.4
-
51
-
-
0042474173
-
Internet Quarantine: Requirements for Containing Self-Propagating Code
-
C. S. D. Moore, G. M. Voelker, and S. Savage, "Internet Quarantine: Requirements for Containing Self-Propagating Code," Proc. IEEE INFOCOM, 2003.
-
Proc. IEEE INFOCOM, 2003
-
-
S, C.1
Moore, D.2
Voelker, G.M.3
Savage, S.4
-
52
-
-
33751035317
-
Design Space and Analysis of Worm Defense Strategies
-
L.-H. L. David Brumley, Pongsin Poosankam, and Dawn Song, "Design Space and Analysis of Worm Defense Strategies," Proc. ACM Symp. Info., Comp. and Commun. Sec., 2006.
-
Proc. ACM Symp. Info., Comp. and Commun. Sec., 2006
-
-
L, L.-H.1
Brumley, D.2
Poosankam, P.3
Song, D.4
-
55
-
-
34547367531
-
Exploiting Temporal Consistency to Reduce False Positives in Host-Based, Collaborative Detection of Worms
-
D. J. M. a. M. D. Smith, "Exploiting Temporal Consistency to Reduce False Positives in Host-Based, Collaborative Detection of Worms," Proc. ACM WORM '06, 2006.
-
Proc. ACM WORM '06, 2006
-
-
M, D.J.1
Smith, M.D.2
-
56
-
-
3042683635
-
Worm and Attack Early Warning
-
S. J. Stolfo, "Worm and Attack Early Warning," IEEE Sec. & Privacy, vol. 2, 2004, pp. 73-75.
-
(2004)
IEEE Sec. & Privacy
, vol.2
, pp. 73-75
-
-
Stolfo, S.J.1
-
57
-
-
84892576316
-
-
retrieved Apr., 2005
-
"Worminator Projector," retrieved Apr., 2005, http://worminator.cs.columbia.edu/public/index.jsp
-
Worminator Projector
-
-
-
59
-
-
33751040612
-
Automatically deducing Propagation Sequences that Circumvent a Collaborative Worm Defense
-
P. A. P. L. Briesemeister, "Automatically deducing Propagation Sequences that Circumvent a Collaborative Worm Defense," Proc. 25th IEEE Conf. Perf., Comp., and Commun., 2006.
-
Proc. 25th IEEE Conf. Perf., Comp., and Commun., 2006
-
-
P, P.A.1
Briesemeister, L.2
|