메뉴 건너뛰기




Volumn 26, Issue 8, 2010, Pages 1433-1443

Modeling the propagation of Peer-to-Peer worms

Author keywords

Defense; Invasive software; Modeling; Network security; Peer to Peer; Propagation; Worms

Indexed keywords

DISCRETE-TIME; IN-NETWORK; INVASIVE SOFTWARE; MATRIX; MATRIX APPROACH; P2P WORM; PEER TO PEER; PROPAGATION CHARACTERISTICS; PROPAGATION MODELS; PROPAGATION PROCESS; SECURITY RESEARCH; SIMULATION EXPERIMENTS; STRUCTURED P2P; UNSTRUCTURED P2P NETWORK; WORM PROPAGATION;

EID: 77955517954     PISSN: 0167739X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.future.2010.04.009     Document Type: Article
Times cited : (31)

References (21)
  • 2
    • 0141762461 scopus 로고    scopus 로고
    • Code-red: A case study on the spread and victims of an internet worm
    • Marseille, France
    • D. Moore, C. Shannon, J. Brown, Code-red: a case study on the spread and victims of an internet worm, in: IMW'02, Marseille, France, 2002, pp. 273284.
    • (2002) IMW'02 , pp. 273-284
    • Moore, D.1    Shannon, C.2    Brown, J.3
  • 4
    • 26844507894 scopus 로고    scopus 로고
    • Routing worm: A fast, selective attack worm based on IP address information
    • C.C. Zou, D. Towsley, W. Gong, S. Cai, Routing worm: a fast, selective attack worm based on IP address information, in: PADS'05, 2005, pp. 199206.
    • (2005) PADS'05 , pp. 199-206
    • Zou, C.C.1    Towsley, D.2    Gong, W.3    Cai, S.4
  • 5
    • 33846607334 scopus 로고    scopus 로고
    • Importance-scanning worm using vulnerable-host distribution
    • Z. Chen, C. Ji, Importance-scanning worm using vulnerable-host distribution, in: IEEE GLOBECOM, 2005, pp. 17791784.
    • (2005) IEEE GLOBECOM , pp. 1779-1784
    • Chen, Z.1    Ji, C.2
  • 6
    • 31844443075 scopus 로고    scopus 로고
    • A self-learning worm using importance scanning
    • Fairfax, VA, USA
    • Z. Chen, C. Ji, A self-learning worm using importance scanning, in: WORM'05, Fairfax, VA, USA, 2005, pp. 2229.
    • (2005) WORM'05 , pp. 22-29
    • Chen, Z.1    Ji, C.2
  • 10
    • 0038349210 scopus 로고    scopus 로고
    • Code Red worm propagation modeling and analysis
    • Washington, DC, USA
    • C.C. Zou, W. Gong, D. Towsley, Code Red worm propagation modeling and analysis, in: CCS'02, Washington, DC, USA, 2002, pp. 138147.
    • (2002) CCS'02 , pp. 138-147
    • Zou, C.C.1    Gong, W.2    Towsley, D.3
  • 15
    • 0042536224 scopus 로고    scopus 로고
    • How to own the internet in your spare time
    • San Francisco, CA, USA
    • S. Staniford, V. Paxson, N. Weaver, How to own the internet in your spare time, in: Security'02, San Francisco, CA, USA, 2002, pp. 149167.
    • (2002) Security'02 , pp. 149-167
    • Staniford, S.1    Paxson, V.2    Weaver, N.3
  • 16
    • 0042474227 scopus 로고    scopus 로고
    • Modeling the spread of active worms
    • Z. Chen, L. Gao, K. Kwiat, Modeling the spread of active worms, in: IEEE INFOCOM, 2003, pp. 18901900.
    • (2003) IEEE INFOCOM , pp. 1890-1900
    • Chen, Z.1    Gao, L.2    Kwiat, K.3
  • 17
    • 4544275741 scopus 로고    scopus 로고
    • Modeling the effects of timing parameters on virus propagation
    • Washington, DC, USA
    • Y. Wang, C. Wang, Modeling the effects of timing parameters on virus propagation, in: WORM'03, Washington, DC, USA, 2003, pp. 6166.
    • (2003) WORM'03 , pp. 61-66
    • Wang, Y.1    Wang, C.2
  • 18
    • 33748372756 scopus 로고    scopus 로고
    • Stochastic behavior of random constant scanning worms
    • San Diego, CA, USA
    • K. Rohloff, T. Basar, Stochastic behavior of random constant scanning worms, in: 14th ICCCN, San Diego, CA, USA, 2005, pp. 339344.
    • (2005) 14th ICCCN , pp. 339-344
    • Rohloff, K.1    Basar, T.2
  • 20
    • 27544467181 scopus 로고    scopus 로고
    • Modeling and automated containment of worms
    • S. Sellke, N.B. Shroff, S. Bagchi, Modeling and automated containment of worms, in: DSN'05, 2005, pp. 528537.
    • (2005) DSN'05 , pp. 528-537
    • Sellke, S.1    Shroff, N.B.2    Bagchi, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.