메뉴 건너뛰기




Volumn 7, Issue 4, 2011, Pages 1082-1091

A novel cloud-based worm propagation model

Author keywords

Cloud security; MRDC; The map reduce program model; Worm propagation

Indexed keywords

ANALYTICAL MODEL; ARCHITECTURE AND PERFORMANCE; CODE RED; COMPUTING TECHNOLOGY; DIVIDE AND CONQUER; FLASH WORMS; MAP-REDUCE; MRDC; NETWORK ENVIRONMENTS; ON-DEMAND SERVICES; OVERALL CHARACTERISTICS; POSSIBLE SOLUTIONS; THE MAP REDUCE PROGRAM MODEL; WORM PROPAGATION;

EID: 79955741619     PISSN: 15539105     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (6)

References (22)
  • 2
    • 67650803219 scopus 로고    scopus 로고
    • An analysis of conficker's logic and rendezvous protocol
    • SRI International
    • P. Porras, H. Saidi, V. Yegneswaran, "An analysis of conficker's logic and rendezvous protocol", Technical report, SRI International (2009), http://mtc.sri.com/Conficker/.
    • (2009) Technical Report
    • Porras, P.1    Saidi, H.2    Yegneswaran, V.3
  • 3
    • 79955737221 scopus 로고    scopus 로고
    • The largest cloud in the world is owned by a criminal
    • Apr.
    • A. Williams, "The Largest Cloud in the World is Owned By A Criminal", Apr. 2010, http://www.readwriteweb.com/cloud/2010/04/ the-largest-cloud-in-the-world.php.
    • (2010)
    • Williams, A.1
  • 4
    • 79955721329 scopus 로고    scopus 로고
    • Symantec global internet security threat report trends for 2009
    • Apr.
    • Symantec, "Symantec Global Internet Security Threat Report Trends for 2009", Volume XV, Apr. 2010, http://www.symantec.com/business/ theme.jsp?themeid=threatreport.
    • (2010) , vol.15
  • 5
    • 68649086619 scopus 로고    scopus 로고
    • Guidance for critical areas of focus in cloud computing.v2.1
    • Dec.
    • CSA, "Guidance for Critical Areas of Focus in Cloud Computing.v2.1", Dec. 2009, http://www.cloudsecurityalliance.org/guidance/ csaguide.v2.1.pdf.
    • (2009)
  • 8
    • 8644229619 scopus 로고    scopus 로고
    • The art of port scanning
    • Sep.
    • Fyodor, "The Art of port scanning", Phrack Magazine, vol. 7(51), pp:11-17, Sep. 1997.
    • (1997) Phrack Magazine , vol.7 , Issue.51 , pp. 11-17
    • Fyodor1
  • 9
    • 19944374456 scopus 로고    scopus 로고
    • A survey and trends on Internet worms
    • Jun.
    • S. Qing, W. Wen, "A survey and trends on Internet worms", Computers & Security Vol. 24(4), pp. 334-346, Jun. 2005.
    • (2005) Computers & Security , vol.24 , Issue.4 , pp. 334-346
    • Qing, S.1    Wen, W.2
  • 10
    • 85030321143 scopus 로고    scopus 로고
    • MapReduce: Simplified data processing on large clusters
    • Dec.
    • J. Dean, S. Ghemawat, "MapReduce: Simplified data processing on large clusters", Proc. of the 6th OSDI, Dec. 2004, pp. 137-150.
    • (2004) Proc. of the 6th OSDI , pp. 137-150
    • Dean, J.1    Ghemawat, S.2
  • 12
    • 8644280743 scopus 로고    scopus 로고
    • Simulating and optimising worm propagation algorithms
    • Sep.
    • T. Vogt, "Simulating and optimising worm propagation algorithms", Sep. 2003 (Updated on Feb. 2004), http://web.lemuria.org/security/WormPropagation.pdf
    • Vogt, T.1
  • 15
    • 0141762461 scopus 로고    scopus 로고
    • Code-red: a case study on the spread and victims of an internet worm
    • D. Moore, C. Shannon, J. Brown, "Code-red: a case study on the spread and victims of an internet worm", Proc. of IMW'02, pp. 273-284, 2002.
    • (2002) Proc. of IMW'02 , pp. 273-284
    • Moore, D.1    Shannon, C.2    Brown, J.3
  • 17
    • 0033979874 scopus 로고    scopus 로고
    • Comparison of deterministic and stochastic SIS and SIR models in discrete time
    • L.J. Allen, A.M. Burgin, "Comparison of deterministic and stochastic SIS and SIR models in discrete time," Mathematical Biosciences, vol.163, pp. 1-33, 2000.
    • (2000) Mathematical Biosciences , vol.163 , pp. 1-33
    • Allen, L.J.1    Burgin, A.M.2
  • 18
    • 33646150900 scopus 로고    scopus 로고
    • On the performance of Internet worm scanning strategies
    • Jul.
    • C.C. Zou, D. Towsley, W. Gong, "On the performance of Internet worm scanning strategies", Elsevier Journal of Performance Evaluation, vol. 63, no. 7, pp. 700-723, Jul. 2006.
    • (2006) Elsevier Journal of Performance Evaluation , vol.63 , Issue.7 , pp. 700-723
    • Zou, C.C.1    Towsley, D.2    Gong, W.3
  • 19
    • 84892612179 scopus 로고    scopus 로고
    • An effective architecture and algorithm for detecting worms with various scan techniques
    • J. Wu, S. Vangala, L. Gao, K. Kwiat, "An Effective Architecture and Algorithm for Detecting Worms with Various Scan Techniques", Proc. of NDSS, 2004.
    • (2004) Proc. of NDSS
    • Wu, J.1    Vangala, S.2    Gao, L.3    Kwiat, K.4
  • 21
    • 79955724717 scopus 로고    scopus 로고
    • Confickers virtual machine detection
    • Confickers virtual machine detection: http://www.sophos.com/blogs/sophoslabs/?p=3744.
  • 22
    • 34249007032 scopus 로고    scopus 로고
    • Worm propagation strategies in an IPv6 Internet
    • Feb.
    • S. M. Bellovin, B. Cheswick, A. Keromytis, "Worm propagation strategies in an IPv6 Internet", vol. 31(1), pp. 70-76, Feb. 2006.
    • (2006) , vol.31 , Issue.1 , pp. 70-76
    • Bellovin, S.M.1    Cheswick, B.2    Keromytis, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.