메뉴 건너뛰기




Volumn 54, Issue 10, 2011, Pages 1700-1720

The microcosmic model of worm propagation

Author keywords

network security; patch strategy; worm propagation

Indexed keywords

ANALYTICAL MODEL; COMPLEX MATRICES; PATCH STRATEGY; PROPAGATION PROBABILITIES; PROPAGATION PROCESS; SECURITY INDUSTRY; WORM PROPAGATION;

EID: 80053479500     PISSN: 00104620     EISSN: 14602067     Source Type: Journal    
DOI: 10.1093/comjnl/bxr082     Document Type: Article
Times cited : (11)

References (28)
  • 1
    • 80053546649 scopus 로고    scopus 로고
    • Symantec Global Internet Security Threat Report. (12 August 2011, date online accessed)
    • (2010) Symantec Global Internet Security Threat Report. http://eval.symantec.com/mktginfo/enterprise/white-papers/bwhitepaper-internet- security-threat-report-xv-04-2010. enus.pdf. (12 August 2011, date online accessed).
    • (2010)
  • 3
    • 54249132169 scopus 로고    scopus 로고
    • Fresh phish
    • Schneider, D. (2008) Fresh phish. IEEE Spectr., 45, 34-38.
    • (2008) IEEE Spectr. , vol.45 , pp. 34-38
    • Schneider, D.1
  • 7
    • 85084162258 scopus 로고    scopus 로고
    • How to own the internet in your spare time
    • San Francisco, CA, USA, August 5-9. USENIX Association, Berkeley
    • Staniford, S., Paxson, V. and Weaver, N. (2002) How to Own the Internet in Your Spare Time. Proc. 11th USENIX Security Symp. (Security '02), San Francisco, CA, USA, August 5-9, pp. 149-167. USENIX Association, Berkeley.
    • (2002) Proc. 11th USENIX Security Symp. (Security '02) , pp. 149-167
    • Staniford, S.1    Paxson, V.2    Weaver, N.3
  • 9
    • 17444402134 scopus 로고    scopus 로고
    • Measurement and analysis of worm propagation on internet network topology
    • Chicago, IL, USA, October 11-13, IEEE, Piscataway
    • Kim, J., Radhakrishnan, S. and Dhall, S. (2004) Measurement and Analysis of Worm Propagation on Internet Network Topology. Proc. 13th Int. Conf. Computer Communications and Networks (ICCCN'04), Chicago, IL, USA, October 11-13, pp. 495-500. IEEE, Piscataway.
    • (2004) Proc. 13th Int. Conf. Computer Communications and Networks (ICCCN'04) , pp. 495-500
    • Kim, J.1    Radhakrishnan, S.2    Dhall, S.3
  • 11
    • 34248995311 scopus 로고    scopus 로고
    • Modeling and simulation study of the propagation and defense of internet email worms
    • Zou, C., Towsley, D. and Gong, W. (2007) Modeling and simulation study of the propagation and defense of internet email worms. IEEE Trans. Dependable Secure Comput., 4, 105-118.
    • (2007) IEEE Trans. Dependable Secure Comput. , vol.4 , pp. 105-118
    • Zou, C.1    Towsley, D.2    Gong, W.3
  • 12
    • 84949487368 scopus 로고    scopus 로고
    • On computer viral infection and the effect of immunization
    • New Orleans, LA, December 11-15, IEEE Computer Society, USA
    • Wang, C., Knight, C. and Elder, C. (2000) On Computer Viral Infection and the Effect of Immunization. 16th Annual Computer Security Applications Conf. (ACSAC'00), New Orleans, LA, December 11-15, pp. 246-256. IEEE Computer Society, USA.
    • (2000) 16th Annual Computer Security Applications Conf. (ACSAC'00) , pp. 246-256
    • Wang, C.1    Knight, C.2    Elder, C.3
  • 13
    • 77955517954 scopus 로고    scopus 로고
    • Modeling the propagation of peer-to-peer worms
    • Fan, X. and Xiang, Y. (2010) Modeling the propagation of peer-to-peer worms. Future Gener. Comput. Syst. J., 26, 1433-1443.
    • (2010) Future Gener. Comput. Syst. J. , vol.26 , pp. 1433-1443
    • Fan, X.1    Xiang, Y.2
  • 14
    • 0141762461 scopus 로고    scopus 로고
    • Code-Red:A case study on the spread and victims of an internetworm
    • Marseille, France, November 6-8. ACM Press, USA
    • Moore, D., Shannon, C. and Brown, J. (2002) Code-Red:A Case Study on the Spread and Victims of an InternetWorm. Proc. 2nd ACMSIGCOMMWorkshop on Internet Measurement, Marseille, France, November 6-8, pp. 273-284. ACM Press, USA.
    • (2002) Proc. 2nd ACMSIGCOMMWorkshop on Internet Measurement , pp. 273-284
    • Moore, D.1    Shannon, C.2    Brown, J.3
  • 16
    • 0042035473 scopus 로고    scopus 로고
    • CAIDA. (12 August 2011, date online accessed)
    • CAIDA. CAIDA analysis of code-red. http://www.caida.org/analysis/ security/code-red/. (12 August 2011, date online accessed).
    • CAIDA Analysis of Code-Red
  • 17
    • 33646150900 scopus 로고    scopus 로고
    • On the performance of internet worm scanning strategies
    • Zou, C., Towsley, D. and Gong,W. (2006) On the performance of internet worm scanning strategies. Perform. Eval., 63, 700-723.
    • (2006) Perform. Eval. , vol.63 , pp. 700-723
    • Zou, C.1    Towsley, D.2    Gong, W.3
  • 19
    • 27544467181 scopus 로고    scopus 로고
    • Modeling and automated containment of worms
    • Yokohama, Japan, June 28-July 1, IEEE Computer Society, USA
    • Sellke, S., Shroff, B. and Bagchi, S. (2005) Modeling and Automated Containment ofWorms. Proc. Int. Conf. Dependable Systems and Networks, Yokohama, Japan, June 28-July 1, pp. 528-537. IEEE Computer Society, USA.
    • (2005) Proc. Int. Conf. Dependable Systems and Networks , pp. 528-537
    • Sellke, S.1    Shroff, B.2    Bagchi, S.3
  • 21
    • 77956613687 scopus 로고    scopus 로고
    • A novel intrusion detection system based on hierarchical clustering and support vector machines
    • Horng, J., Su, Y., Chen, H., Kao, W., Chen, J., Lai, L. and Perkasa, D. (2011) A novel intrusion detection system based on hierarchical clustering and support vector machines. Expert Syst. Appl., 38, 306-313.
    • (2011) Expert Syst. Appl. , vol.38 , pp. 306-313
    • Horng, J.1    Su, Y.2    Chen, H.3    Kao, W.4    Chen, J.5    Lai, L.6    Perkasa, D.7
  • 23
    • 14944368398 scopus 로고    scopus 로고
    • Worm propagation modeling and analysis under dynamic quarantine defense
    • Washington, DC, USA, October 27, ACM, USA
    • Zou, C., Gong, W. and Towsley, D. (2003) Worm Propagation Modeling and Analysis Under Dynamic Quarantine Defense. Proc. ACMWorkshop on Rapid Malcode (WORM'03),Washington, DC, USA, October 27, pp. 51-60. ACM, USA.
    • (2003) Proc. ACMWorkshop on Rapid Malcode (WORM'03) , pp. 51-60
    • Zou, C.1    Gong, W.2    Towsley, D.3
  • 24
    • 28044469549 scopus 로고    scopus 로고
    • The monitoring and early detection of Internet worms
    • Zou, C., Gong, W., Towsley, D. and Gao, L. (2005) The monitoring and early detection of Internet worms. IEEE/ACM Trans. Netw. (TON), 13, 961-974.
    • (2005) IEEE/ACM Trans. Netw. (TON) , vol.13 , pp. 961-974
    • Zou, C.1    Gong, W.2    Towsley, D.3    Gao, L.4
  • 26
    • 84892612179 scopus 로고    scopus 로고
    • An efficient architecture and algorithm for detecting worms with various scan techniques
    • San Diego, CA, USA, February 5-6. The Internet Society, USA
    • Wu, J., Vangala, S., Gao, L. and Kwiat, K. (2004) An Efficient Architecture and Algorithm for Detecting Worms with Various Scan Techniques. Proc. 11th Annual Network and Distributed System Security Symposium (NDSS'04), San Diego, CA, USA, February 5-6, pp. 143-156. The Internet Society, USA.
    • (2004) Proc. 11th Annual Network and Distributed System Security Symposium (NDSS'04) , pp. 143-156
    • Wu, J.1    Vangala, S.2    Gao, L.3    Kwiat, K.4
  • 27
    • 80053479504 scopus 로고    scopus 로고
    • Symantec Internet Security Threat Report. (12 August 2011, date online accessed)
    • (2010) Symantec Internet Security Threat Report. http://eval.symantec. com/mktginfo/enterprise/white-papers/b-whitepaper-lam-internet-security-threat- report-xv-04-2010.en-us.pdf. (12 August 2011, date online accessed).
    • (2010)
  • 28
    • 0242314805 scopus 로고    scopus 로고
    • CAIDA. (12 August 2011, date online accessed)
    • CAIDA. The Spread of the Sapphire/SlammerWorm. http://www. caida.org/publications/papers/2003/sapphire/sapphire.html. (12 August 2011, date online accessed).
    • The Spread of the Sapphire/Slammer Worm


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.