메뉴 건너뛰기




Volumn 10, Issue 1, 2008, Pages 20-35

A survey of internet worm detection and containment

Author keywords

[No Author keywords available]

Indexed keywords

DETECTION ALGORITHM; FULLY AUTOMATED; FUTURE RESEARCH DIRECTIONS; HUMAN INTERACTIONS; INTERNET WORM DETECTION; SELF-PROPAGATING MALICIOUS CODES; WORM DETECTION;

EID: 77953145744     PISSN: None     EISSN: 1553877X     Source Type: Journal    
DOI: 10.1109/COMST.2008.4483668     Document Type: Review
Times cited : (113)

References (60)
  • 1
    • 0041065277 scopus 로고
    • The Internet Worm Program: An Analysis
    • E. Spafford, "The Internet Worm Program: An Analysis," Comp. Commun. Rev., 1989.
    • (1989) Comp. Commun. Rev.
    • Spafford, E.1
  • 4
    • 34547185428 scopus 로고    scopus 로고
    • On the Impact of Dynamic Addressing on Malware Propagation
    • F. M. Moheeb Abu Rajab and Andreas Terzis, "On the Impact of Dynamic Addressing on Malware Propagation," Proc. ACM WORM '06, 2006.
    • Proc. ACM WORM '06, 2006
    • M, F.1    Rajab, M.A.2    Terzis, A.3
  • 9
    • 33746642190 scopus 로고    scopus 로고
    • Worms and Viruses and Botnets, Oh My! Rational Responses to Emerging Internet Threats
    • G. P. Schaffer, "Worms and Viruses and Botnets, Oh My! Rational Responses to Emerging Internet Threats," IEEE Sec. & Privacy, vol. 4, 2006, pp. 52-58.
    • (2006) IEEE Sec. & Privacy , vol.4 , pp. 52-58
    • Schaffer, G.P.1
  • 11
    • 34547143641 scopus 로고    scopus 로고
    • Internet-Scale Malware Mitigation: Combining Intelligence of the Control and Data Plane
    • E. C. Ying Zhang and Z. Morley Mao, "Internet-Scale Malware Mitigation: Combining Intelligence of the Control and Data Plane," Proc. ACM WORM '06, 2006.
    • Proc. ACM WORM '06, 2006
    • C, E.1    Zhang, Y.2    Mao, Z.M.3
  • 12
    • 0742276097 scopus 로고    scopus 로고
    • Inside the Slammer Worm
    • V. P. D. Moore et al., "Inside the Slammer Worm," IEEE Sec. & Privacy, vol. 1, 2003, pp. 33-39.
    • (2003) IEEE Sec. & Privacy , vol.1 , pp. 33-39
    • P, V.1    Moore, D.2
  • 13
    • 84872920896 scopus 로고    scopus 로고
    • May
    • D. G. Glazer, "Computer Worms," May 2005, http://www.research. umbc.edu/~dgorin1/is432/worms.htm
    • (2005) Computer Worms
    • Glazer, D.G.1
  • 14
    • 84892600344 scopus 로고    scopus 로고
    • retrieved July 2007
    • "Morris (Computer Worm)," retrieved July 2007, http://en.wikipedia.org/wiki/Morris-worm
    • Morris (Computer Worm)
  • 15
    • 78651564650 scopus 로고    scopus 로고
    • retrieved July 2007
    • "F-Secure Virus Descriptions: Nimda," retrieved July 2007, http://www.f-secure.com/v-descs/nimda.shtml, 2001
    • (2001) F-Secure Virus Descriptions: Nimda
  • 16
    • 0042536297 scopus 로고    scopus 로고
    • retrieved July 2007
    • "CERT" Advisory CA-2001-26 Nimda Worm," retrieved July 2007, http://www.cert.org/advisories/CA-2001-26.html, 2001.
    • (2001) "CERT" Advisory CA-2001-26 Nimda Worm
  • 21
    • 4344627335 scopus 로고    scopus 로고
    • The Spread of the Witty Worm
    • C. S. D. Moore, "The Spread of the Witty Worm," IEEE Sec. & Privacy, vol. 2, 2004, pp. 46-50.
    • (2004) IEEE Sec. & Privacy , vol.2 , pp. 46-50
    • S, C.1    Moore, D.2
  • 22
    • 84892563548 scopus 로고    scopus 로고
    • 2nd ed., Syngress, O'Reilly
    • R. A. et al., Snort 2.1 Intrusion Detection, 2nd ed., Syngress, O'Reilly, 2004, pp. 490-91.
    • (2004) Snort 2.1 Intrusion Detection , pp. 490-491
    • A, R.1
  • 24
    • 84892587190 scopus 로고    scopus 로고
    • May
    • "Snort," May 2005, http://www.snort.org
    • (2005) Snort
  • 31
    • 21644482790 scopus 로고    scopus 로고
    • Worm Detection, Early Warning and Response Based on Local Victim Information
    • M. S. G. Gu et al., "Worm Detection, Early Warning and Response Based on Local Victim Information," Proc. 20th Annual Comp. Sec. Apps. Conf., 2004.
    • Proc. 20th Annual Comp. Sec. Apps. Conf., 2004
    • S, M.1    Gu, G.2
  • 38
    • 71249088245 scopus 로고    scopus 로고
    • retrieved Aug. 2005
    • "Honeyd Virtual Honeypot," retrieved Aug. 2005, http://honeyd.org
    • Honeyd Virtual Honeypot
  • 40
    • 0141441130 scopus 로고    scopus 로고
    • PHAD: Packet Header Anomaly Detection for Identifying Hostile Network Traffic
    • P. K. C. Matthew V. Mahoney, "PHAD: Packet Header Anomaly Detection for Identifying Hostile Network Traffic," FL Inst. Tech. tech. rep. CS-2001-04, 2001.
    • (2001) FL Inst. Tech. Tech. Rep. CS-2001-04
    • C, P.K.1    Mahoney, M.V.2
  • 45
    • 85084163246 scopus 로고    scopus 로고
    • Autograph: Toward Automated, Distributed Worm Signature Detection
    • B. K. H. Kim, "Autograph: Toward Automated, Distributed Worm Signature Detection," Proc. 13th USENIX Sec. Symp., 2004.
    • Proc. 13th USENIX Sec. Symp., 2004
    • K, B.1    Kim, H.2
  • 55
    • 34547367531 scopus 로고    scopus 로고
    • Exploiting Temporal Consistency to Reduce False Positives in Host-Based, Collaborative Detection of Worms
    • D. J. M. a. M. D. Smith, "Exploiting Temporal Consistency to Reduce False Positives in Host-Based, Collaborative Detection of Worms," Proc. ACM WORM '06, 2006.
    • Proc. ACM WORM '06, 2006
    • M, D.J.1    Smith, M.D.2
  • 56
    • 3042683635 scopus 로고    scopus 로고
    • Worm and Attack Early Warning
    • S. J. Stolfo, "Worm and Attack Early Warning," IEEE Sec. & Privacy, vol. 2, 2004, pp. 73-75.
    • (2004) IEEE Sec. & Privacy , vol.2 , pp. 73-75
    • Stolfo, S.J.1
  • 57
    • 84892576316 scopus 로고    scopus 로고
    • retrieved Apr., 2005
    • "Worminator Projector," retrieved Apr., 2005, http://worminator.cs.columbia.edu/public/index.jsp
    • Worminator Projector


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.