메뉴 건너뛰기




Volumn , Issue , 2010, Pages 1128-1135

Propagation modeling of peer-to-peer worms

Author keywords

Modeling; Peer to peer; Propagation; Worms

Indexed keywords

CRITICAL VALUE; DISCRETE-TIME; IN-NETWORK; MATRIX; MATRIX APPROACH; P2P NETWORK; P2P WORM; PEER TO PEER; PROPAGATION MODELING; PROPAGATION MODELS; SECURITY RESEARCH; SIMULATION EXPERIMENTS; STRUCTURED P2P; WORM PROPAGATION;

EID: 77954346500     PISSN: 1550445X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/AINA.2010.96     Document Type: Conference Paper
Times cited : (12)

References (21)
  • 2
    • 0141762461 scopus 로고    scopus 로고
    • Code-Red: A case study on the spread and victims of an Internet worm
    • Marseille, France
    • D. Moore, C. Shannon, and J. Brown, "Code-Red: a case study on the spread and victims of an Internet worm," in Proc. IMW '02, Marseille, France, 2002, pp. 273-284.
    • (2002) Proc. IMW '02 , pp. 273-284
    • Moore, D.1    Shannon, C.2    Brown, J.3
  • 4
    • 26844507894 scopus 로고    scopus 로고
    • Routing worm: A fast, selective attack worm based on IP address information
    • C. C. Zou, D. Towsley, W. Gong, and S. Cai, "Routing worm: a fast, selective attack worm based on IP address information," in Proc. PADS '05, 2005, pp. 199-206.
    • (2005) Proc. PADS '05 , pp. 199-206
    • Zou, C.C.1    Towsley, D.2    Gong, W.3    Cai, S.4
  • 5
    • 33846607334 scopus 로고    scopus 로고
    • Importance-scanning worm using vulnerable-host distribution
    • Z. Chen and C. Ji, "Importance-scanning worm using vulnerable-host distribution," in Proc. IEEE GLOBECOM, 2005, pp. 1779-1784.
    • (2005) Proc. IEEE GLOBECOM , pp. 1779-1784
    • Chen, Z.1    Ji, C.2
  • 6
    • 31844443075 scopus 로고    scopus 로고
    • A self-learning worm using importance scanning
    • Fairfax, VA
    • Z. Chen and C. Ji, "A self-learning worm using importance scanning," in Proc. WORM '05, Fairfax, VA, 2005, pp. 22-29.
    • (2005) Proc. WORM '05 , pp. 22-29
    • Chen, Z.1    Ji, C.2
  • 8
    • 3042742908 scopus 로고    scopus 로고
    • An analysis of the Slapper worm
    • I. Arce and E. Levy, "An analysis of the Slapper worm," in IEEE Security & Privacy, 2003, pp. 82-87.
    • (2003) IEEE Security & Privacy , pp. 82-87
    • Arce, I.1    Levy, E.2
  • 10
    • 0038349210 scopus 로고    scopus 로고
    • Code Red worm propagation modeling and analysis
    • Washington D.C.
    • C. C. Zou, W. Gong, and D. Towsley, "Code Red worm propagation modeling and analysis," in Proc. CCS '02, Washington D.C., 2002, pp. 138-147.
    • (2002) Proc. CCS '02 , pp. 138-147
    • Zou, C.C.1    Gong, W.2    Towsley, D.3
  • 15
    • 85084162258 scopus 로고    scopus 로고
    • How to own the Internet in your spare time
    • San Francisco, CA
    • S. Staniford, V. Paxson, and N. Weaver, "How to own the Internet in your spare time," in Proc. Security '02, San Francisco, CA, 2002, pp. 149-167.
    • (2002) Proc. Security '02 , pp. 149-167
    • Staniford, S.1    Paxson, V.2    Weaver, N.3
  • 16
    • 0042474227 scopus 로고    scopus 로고
    • Modeling the spread of active worms
    • Z. Chen, L. Gao, and K. Kwiat, "Modeling the spread of active worms," in Proc. IEEE INFOCOM, 2003, pp. 1890-1900.
    • (2003) Proc. IEEE INFOCOM , pp. 1890-1900
    • Chen, Z.1    Gao, L.2    Kwiat, K.3
  • 17
    • 4544275741 scopus 로고    scopus 로고
    • Modeling the effects of timing parameters on virus propagation
    • Washington D.C.
    • Y. Wang and C. Wang, "Modeling the effects of timing parameters on virus propagation," in Proc. WORM '03, Washington D.C., 2003, pp. 61-66.
    • (2003) Proc. WORM '03 , pp. 61-66
    • Wang, Y.1    Wang, C.2
  • 18
    • 33748372756 scopus 로고    scopus 로고
    • Stochastic behavior of random constant scanning worms
    • San Diego, CA
    • K. Rohloff and T. Basar, "Stochastic behavior of random constant scanning worms," in Proc. 14th ICCCN, San Diego, CA, 2005, pp. 339-344.
    • (2005) Proc. 14th ICCCN , pp. 339-344
    • Rohloff, K.1    Basar, T.2
  • 20
    • 27544467181 scopus 로고    scopus 로고
    • Modeling and automated containment of worms
    • S. Sellke, N. B. Shroff, and S. Bagchi, "Modeling and automated containment of worms," in Proc. DSN '05, 2005, pp. 528-537.
    • (2005) Proc. DSN '05 , pp. 528-537
    • Sellke, S.1    Shroff, N.B.2    Bagchi, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.