메뉴 건너뛰기




Volumn 62, Issue 3, 2012, Pages 1451-1479

Strategy of fast and light-load cloud-based proactive benign worm countermeasure technology to contain worm propagation

Author keywords

Benign worm; Cloud based Re WAW model; Re WAW model; Two stage Re WAW model; Worm propagation

Indexed keywords

BENIGN WORM; COMPUTING TECHNOLOGY; MALICIOUS WORM; NETWORK CONGESTIONS; POTENTIAL RISKS; PROACTIVE DEFENSE; PROPAGATION MODELS; TWO-FACTOR MODELS; WORM PROPAGATION;

EID: 84869497701     PISSN: 09208542     EISSN: 15730484     Source Type: Journal    
DOI: 10.1007/s11227-012-0812-8     Document Type: Article
Times cited : (7)

References (53)
  • 5
    • 77954950954 scopus 로고    scopus 로고
    • Symantec global Internet security threat report trends for 2009
    • Symantec
    • Symantec (2010) Symantec global Internet security threat report trends for 2009. Technical report, XV
    • (2010) Technical Report, XV
  • 8
    • 19944374456 scopus 로고    scopus 로고
    • A survey and trends on Internet worms
    • doi:10.1016/j.cose.2004.10.001
    • Qing S, Wen W (2005) A survey and trends on Internet worms. Comput Secur 24:334-346. doi:10.1016/j.cose.2004.10.001
    • (2005) Comput Secur , vol.24 , pp. 334-346
    • Qing, S.1    Wen, W.2
  • 9
    • 0023294949 scopus 로고
    • Computer viruses: Theory and experiments
    • doi:10.1016/0167-4048(87)90122-2
    • Cohen F (1987) Computer viruses: theory and experiments. Comput Secur 6(1):22-35. doi:10.1016/0167-4048(87)90122-2
    • (1987) Comput Secur , vol.6 , Issue.1 , pp. 22-35
    • Cohen, F.1
  • 18
    • 26844518826 scopus 로고    scopus 로고
    • Epidemiological models applied to viruses in computer networks
    • Piqueira JRC, Navarro BF, Monteiro LHA (2005) Epidemiological models applied to viruses in computer networks. J Comput Sci 1(1):31-34
    • (2005) J Comput Sci , vol.1 , Issue.1 , pp. 31-34
    • Piqueira, J.R.C.1    Navarro, B.F.2    Monteiro, L.H.A.3
  • 19
    • 34547208045 scopus 로고    scopus 로고
    • The impact of stochastic variance on worm propagation and detection
    • doi:10.1145/1179542.1179555
    • Nicol DM (2006) The impact of stochastic variance on worm propagation and detection. In: Proceedings of the 4th ACM workshop on recurring malcode, pp 57-64. doi:10.1145/1179542.1179555
    • (2006) Proceedings of the 4th ACM Workshop on Recurring Malcode , pp. 57-64
    • Nicol, D.M.1
  • 20
    • 33646150900 scopus 로고    scopus 로고
    • On the performance of Internet worm scanning strategies
    • doi:10.1016/j.peva.2005.07.032
    • Zou CC, Towsley D, Gong W (2006) On the performance of Internet worm scanning strategies. J Perform Eval 63(7):700-723. doi:10.1016/j.peva.2005.07. 032
    • (2006) J Perform Eval , vol.63 , Issue.7 , pp. 700-723
    • Zou, C.C.1    Towsley, D.2    Gong, W.3
  • 21
    • 51249101344 scopus 로고    scopus 로고
    • Modeling and analysis of worm interactions (war of the worms)
    • Tanachaiwiwat S, Helmy A (2007) Modeling and analysis of worm interactions (war of the worms). In: Proceedings of BROADNETS'07, pp 649-658
    • (2007) Proceedings of BROADNETS'07 , pp. 649-658
    • Tanachaiwiwat, S.1    Helmy, A.2
  • 22
    • 34249894205 scopus 로고    scopus 로고
    • Functional similarities between computer worms and biological pathogens
    • doi:10.1016/j.cose.2006.12.002
    • Li J, Knickerbocker P (2007) Functional similarities between computer worms and biological pathogens. Comput Secur 26(4):338-347. doi:10.1016/j.cose. 2006.12.002
    • (2007) Comput Secur , vol.26 , Issue.4 , pp. 338-347
    • Li, J.1    Knickerbocker, P.2
  • 23
    • 55949131751 scopus 로고    scopus 로고
    • Network virus-epidemic model with the point-to-group information propagation
    • doi:10.1016/j.amc.2008.09.025
    • Yuan H, Chen G (2008) Network virus-epidemic model with the point-to-group information propagation. Appl Comput Math 206(1):357-367. doi:10.1016/j.amc.2008.09.025
    • (2008) Appl Comput Math , vol.206 , Issue.1 , pp. 357-367
    • Yuan, H.1    Chen, G.2
  • 25
    • 77956567216 scopus 로고    scopus 로고
    • Modeling and analysis of Internet worm propagation
    • doi:10.1016/S1005-8885(09)60489-1
    • Su F, Lin Z, Ma Y (2010) Modeling and analysis of Internet worm propagation. J China Univ Post Telecommun 17(4):63-68. doi:10.1016/S1005- 8885(09)60489-1
    • (2010) J China Univ Post Telecommun , vol.17 , Issue.4 , pp. 63-68
    • Su, F.1    Lin, Z.2    Ma, Y.3
  • 26
    • 79957686762 scopus 로고    scopus 로고
    • On detecting active worms with varying scan rate
    • doi:10.1016/j.comcom.2010.10.014
    • Yu W, Wang X, Champion A, Xuan D, Lee D (2011) On detecting active worms with varying scan rate. Comput Commun 34(11):1269-1282. doi:10.1016/j.comcom. 2010.10.014
    • (2011) Comput Commun , vol.34 , Issue.11 , pp. 1269-1282
    • Yu, W.1    Wang, X.2    Champion, A.3    Xuan, D.4    Lee, D.5
  • 29
    • 1642434224 scopus 로고    scopus 로고
    • Using sensor networks and data fusion for early detection of active worms
    • doi:10.1117/12.500849
    • Berk VH, Gray RS, Bakos G (2003) Using sensor networks and data fusion for early detection of active worms. Proc SPIE 2003:92-104. doi:10.1117/12. 500849
    • (2003) Proc SPIE 2003 , pp. 92-104
    • Berk, V.H.1    Gray, R.S.2    Bakos, G.3
  • 32
    • 0004204717 scopus 로고    scopus 로고
    • The design of GrIDS: A graph-based intrusion detection system
    • Accessed 15 September 2010
    • Cheung S, Hoagland J, Levitt K, Rowe J, Staniford S et al (1999) The design of GrIDS: a graph-based intrusion detection system. Technical report, CSE-99-2. http://citeseer.nj.nec.com/cheung99design.html. Accessed 15 September 2010
    • (1999) Technical Report, CSE-99-92
    • Cheung, S.1    Hoagland, J.2    Levitt, K.3    Rowe, J.4    Staniford, S.5
  • 36
    • 71649112409 scopus 로고    scopus 로고
    • Worm virulence estimation for the containment of local worm outbreak
    • doi:10.1016/j.cose.2009.07.002
    • Choi Y, Li L, Liu P, Kesidis G (2010) Worm virulence estimation for the containment of local worm outbreak. Comput Secur 29:104-123. doi:10.1016/j.cose.2009.07.002
    • (2010) Comput Secur , vol.29 , pp. 104-123
    • Choi, Y.1    Li, L.2    Liu, P.3    Kesidis, G.4
  • 37
    • 14944368398 scopus 로고    scopus 로고
    • Worm propagation modeling and analysis under dynamic quarantine defense
    • doi:10.1145/948187.948197
    • Zou CC, Gong W, Towsley D (2003) Worm propagation modeling and analysis under dynamic quarantine defense. In: Proceedings of the 2003 ACM workshop on rapid malcode, pp 51-60. doi:10.1145/948187.948197
    • (2003) Proceedings of the 2003 ACM Workshop on Rapid Malcode , pp. 51-60
    • Zou, C.C.1    Gong, W.2    Towsley, D.3
  • 38
    • 14844308379 scopus 로고    scopus 로고
    • Containment of scanning worm in an enterprise networks
    • Staniford S (2004) Containment of scanning worm in an enterprise networks. Journal of Computer Security
    • (2004) Journal of Computer Security
    • Staniford, S.1
  • 41
    • 33646386296 scopus 로고    scopus 로고
    • Modeling and analysis on the interaction between the Internet worm and anti-worm
    • Yang F, Duan H, Li X (2004) Modeling and analysis on the interaction between the Internet worm and anti-worm. J Sci China Ser E, Inf Sci 34(8):841-856
    • (2004) J Sci China ser E, Inf Sci , vol.34 , Issue.8 , pp. 841-856
    • Yang, F.1    Duan, H.2    Li, X.3
  • 42
    • 34047267176 scopus 로고    scopus 로고
    • Anti-worm based on hybrid confronting technology
    • Wang C, Qing S, He J (2007) Anti-worm based on hybrid confronting technology. J Commun 28(1):28-34
    • (2007) J Commun , vol.28 , Issue.1 , pp. 28-34
    • Wang, C.1    Qing, S.2    He, J.3
  • 43
    • 34948870917 scopus 로고    scopus 로고
    • Modeling and analysis of active benign worms and hybrid benign worms containing the spread of worms
    • doi:10.1109/ICN.2007.58
    • Zhou H, Wen Y, Zhao H (2007) Modeling and analysis of active benign worms and hybrid benign worms containing the spread of worms. In: Proceedings of the sixth international conference on networking. doi:10.1109/ICN.2007.58
    • (2007) Proceedings of the Sixth International Conference on Networking
    • Zhou, H.1    Wen, Y.2    Zhao, H.3
  • 44
    • 66549105472 scopus 로고    scopus 로고
    • Passive benign worm propagation modeling with dynamic quarantine defense
    • Toutonji O, Yoo S-M (2009) Passive benign worm propagation modeling with dynamic quarantine defense. KSII Trans Internet Inf Syst 3(1):96-107
    • (2009) KSII Trans Internet Inf Syst , vol.3 , Issue.1 , pp. 96-107
    • Toutonji, O.1    Yoo, S.-M.2
  • 45
    • 67650528765 scopus 로고    scopus 로고
    • Modeling and analysis of divide-and-rule-hybrid-benign worms
    • Zhou H, Zhao H, Wen Y (2009) Modeling and analysis of divide-and-rule-hybrid-benign worms. J Comput Res Dev 46(7):1110-1116
    • (2009) J Comput Res Dev , vol.46 , Issue.7 , pp. 1110-1116
    • Zhou, H.1    Zhao, H.2    Wen, Y.3
  • 48
    • 84870628970 scopus 로고    scopus 로고
    • Accessed 23 March 2003
    • Kem M (2003) CRClean. http://archives.neohapsis.com/archives/vuln-dev/ 2001-q3/0577.html. Accessed 23 March 2003
    • (2003) CRClean
    • Kem, M.1
  • 49
    • 77956159972 scopus 로고    scopus 로고
    • Accessed 8 May 2003
    • Hexxer H (2003) CodeGreen beta release. http://online.securityfocus.com/ archive/. 82/211462. Accessed 8 May 2003
    • (2003) CodeGreen Beta Release
    • Hexxer, H.1
  • 51
    • 79955741619 scopus 로고    scopus 로고
    • A novel Cloud-based worm propagation model
    • Zheng X, Li T, Yang H (2011) A novel Cloud-based worm propagation model. J Comput Inf Syst 7(4):1082-1091
    • (2011) J Comput Inf Syst , vol.7 , Issue.4 , pp. 1082-1091
    • Zheng, X.1    Li, T.2    Yang, H.3
  • 52
    • 84870630276 scopus 로고    scopus 로고
    • Accessed 12 April 2004
    • Messmer E (2004) Themyth of the good worm. http://www.wormblog.com/2004/ 11/the-myth-of-the.html. Accessed 12 April 2004
    • (2004) Themyth of the Good Worm
    • Messmer, E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.