메뉴 건너뛰기




Volumn 3, Issue 1, 2008, Pages 36-46

Origins: An approach to trace fast spreading worms to their roots

Author keywords

Attack trace back; Computer worm attacks; Network security

Indexed keywords

COMPUTER SIMULATION; INTERNET; NETWORK SECURITY;

EID: 79951598312     PISSN: 17478405     EISSN: 17478413     Source Type: Journal    
DOI: 10.1504/IJSN.2008.016200     Document Type: Article
Times cited : (10)

References (25)
  • 3
    • 0042474227 scopus 로고    scopus 로고
    • Modeling the spread of active worms
    • San Francisco, CA
    • Chen, Z., Gao, L. and Kwiat, K. (2003) 'Modeling the spread of active worms', Proceedings of IEEE INFOCOM 2003, San Francisco, CA, Vol. 3, pp.1890-1900.
    • (2003) Proceedings of IEEE INFOCOM 2003 , vol.3 , pp. 1890-1900
    • Chen, Z.1    Gao, L.2    Kwiat, K.3
  • 4
    • 0004204717 scopus 로고    scopus 로고
    • The Design of GrIDS: A Graph-Based Intrusion Detection System
    • Technical Report CSE-99-2, University of California Davis, Computer Science Department
    • Cheung, S., Crawford, R., Dilger, M., Frank, J., Hoagland, J., Levitt, K., Rowe, J., Staniford-Chen, S., Yip, R. and Zerkle, D. (1999) The Design of GrIDS: A Graph-Based Intrusion Detection System, Technical Report CSE-99-2, University of California Davis - Computer Science Department, http://citeseer.nj.nec.com/cheung99design.html.
    • (1999)
    • Cheung, S.1    Crawford, R.2    Dilger, M.3    Frank, J.4    Hoagland, J.5    Levitt, K.6    Rowe, J.7    Staniford-Chen, S.8    Yip, R.9    Zerkle, D.10
  • 7
    • 85086419824 scopus 로고    scopus 로고
    • Internet Engineering Task Force Homepage
    • Internet Engineering Task Force Homepage (2003) ICMP Traceback (itrace) [www], http://www.ietf.org/html.charters/OLD/ itrace-charter.html.
    • (2003) ICMP Traceback (itrace) [www]
  • 12
    • 0042474173 scopus 로고    scopus 로고
    • Internet quarantine: Requirements for containing self propagating code
    • San Francisco, CA
    • Moore, D., Shannon, C., Voelker, G.M. and Savage, S. (2003b) 'Internet quarantine: Requirements for containing self propagating code', Proceedings of IEEE INFOCOM 2003, San Francisco, CA, Vol. 3, pp.1901-1910.
    • (2003) Proceedings of IEEE INFOCOM 2003 , vol.3 , pp. 1901-1910
    • Moore, D.1    Shannon, C.2    Voelker, G.M.3    Savage, S.4
  • 14
    • 84890867180 scopus 로고    scopus 로고
    • Defense and detection strategies against internet worms
    • Boston, MA, ISBN 1-58053-537-2
    • Nazario, J. (2004) 'Defense and detection strategies against internet worms', Artech House, Boston, MA, ISBN 1-58053-537-2.
    • (2004) Artech House
    • Nazario, J.1
  • 16
    • 85086419345 scopus 로고    scopus 로고
    • NS-2 Homepage (2003) The Network Simulator, NS-2 [www
    • NS-2 Homepage (2003) The Network Simulator - NS-2 [www], http:// www.isi.edu/nsnam/ns/.
  • 17
    • 85086419714 scopus 로고    scopus 로고
    • RawIP Networking FAQ Homepage (1999) RawIP Networking FAQ [www], http://www.ntua.gr/rin/rawfaq.html.
    • RawIP Networking FAQ Homepage (1999) RawIP Networking FAQ [www], http://www.ntua.gr/rin/rawfaq.html.
  • 18
    • 85086419439 scopus 로고    scopus 로고
    • Reiss, S. (2003) 'Hope is a lousy defense - interview with bill joy', Wired Magazine, No. 11.12, pp.8-11.
    • Reiss, S. (2003) 'Hope is a lousy defense - interview with bill joy', Wired Magazine, No. 11.12, pp.8-11.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.