메뉴 건너뛰기




Volumn 21, Issue 10, 2010, Pages 1501-1514

Self-disciplinary worms and countermeasures: Modeling and analysis

Author keywords

anomaly detection; game theory; Worm

Indexed keywords

HARDWARE; SIGNAL PROCESSING;

EID: 77956179239     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2009.161     Document Type: Article
Times cited : (37)

References (61)
  • 23
    • 77956178420 scopus 로고    scopus 로고
    • SANS, Internet Storm Center, http://isc.sans.org/, 2004.
    • (2004)
  • 26
    • 2442556704 scopus 로고    scopus 로고
    • Robust correlation of encrypted attack traffic through stepping stones by manipulation of inter- packet delays
    • Nov.
    • X. Wang and D.S. Reeves, "Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Manipulation of Inter- Packet Delays," Proc. ACM Conf. Computer and Comm. Security (CCS), Nov. 2003.
    • (2003) Proc. ACM Conf. Computer and Comm. Security (CCS)
    • Wang, X.1    Reeves, D.S.2
  • 34
    • 34548325869 scopus 로고    scopus 로고
    • Towards unbiased end-to-end network diagnosis
    • Sept.
    • Y. Zhao, Y. Chen, and D. Bindel, "Towards Unbiased End-to-End Network Diagnosis," Proc. ACM SIGCOMM, Sept. 2006.
    • (2006) Proc. ACM SIGCOMM
    • Zhao, Y.1    Chen, Y.2    Bindel, D.3
  • 35
    • 0000615530 scopus 로고    scopus 로고
    • An integrated congestion management architecture for internet hosts
    • Sept.
    • H. Balakrishnan, S. Seshan, and H. Rahul, "An Integrated Congestion Management Architecture for Internet Hosts," Proc. ACM SIGCOMM, Sept. 1999.
    • (1999) Proc. ACM SIGCOMM
    • Balakrishnan, H.1    Seshan, S.2    Rahul, H.3
  • 40
    • 77956179606 scopus 로고    scopus 로고
    • MetaPHOR
    • MetaPHOR, http://securityresponse.symantec.com/avcenter/ venc/data/w32.simile.html, 2010.
    • (2010)
  • 49
    • 77952395098 scopus 로고    scopus 로고
    • On the trade-off between speed and resiliency of flash worms and similar malcodes
    • Oct.
    • D. Ha and H. Ngo, "On the Trade-Off between Speed and Resiliency of Flash Worms and Similar Malcodes," Proc. Fifth ACM Workshop Recurring Malcode (WORM), Oct. 2007.
    • (2007) Proc. Fifth ACM Workshop Recurring Malcode (WORM)
    • Ha, D.1    Ngo, H.2
  • 50
    • 57349091683 scopus 로고    scopus 로고
    • Improving sensor network immunity under worm attacks: A software diversity approach
    • May
    • Y. Yang, S. Zhu, and G. Cao, "Improving Sensor Network Immunity under Worm Attacks: A Software Diversity Approach," Proc. ACM MobiHoc, May 2008.
    • (2008) Proc. ACM MobiHoc
    • Yang, Y.1    Zhu, S.2    Cao, G.3
  • 53
    • 33746603312 scopus 로고    scopus 로고
    • Mining anomalies using traffic feature distribution
    • Aug.
    • M. Crovella, A. Lakhina, and C. Diot, "Mining Anomalies Using Traffic Feature Distribution," Proc. ACM SIGCOMM, Aug. 2005.
    • (2005) Proc. ACM SIGCOMM
    • Crovella, M.1    Lakhina, A.2    Diot, C.3
  • 57
    • 16644384919 scopus 로고    scopus 로고
    • Incentive-based modeling and inference of attacker intent, objectives, and strategies
    • P. Liu and W.Y.M. Yu, "Incentive-Based Modeling and Inference of Attacker Intent, Objectives, and Strategies," ACM Trans. Information System and Security, vol. 8, no. 1, pp. 78-118, 2005.
    • (2005) ACM Trans. Information System and Security , vol.8 , Issue.1 , pp. 78-118
    • Liu, P.1    Yu, W.Y.M.2
  • 58
    • 33947628137 scopus 로고    scopus 로고
    • Game theoretic analysis of cooperation stimulation and security in autonomous mobile ad hoc networks
    • May
    • W. Yu and K.J.R. Liu, "Game Theoretic Analysis of Cooperation Stimulation and Security in Autonomous Mobile Ad Hoc Networks," IEEE Trans. Mobile Computing, vol. 6, no. 5, pp. 507-521, May 2007.
    • (2007) IEEE Trans. Mobile Computing , vol.6 , Issue.5 , pp. 507-521
    • Yu, W.1    Liu, K.J.R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.