메뉴 건너뛰기




Volumn 5, Issue 2, 2012, Pages 115-131

An agent-based model to simulate coordinated response to malware outbreak within an organisation

Author keywords

Agent based modelling; Epidemiological modelling; Malware containment; Malware incident response plan

Indexed keywords

AUTONOMOUS AGENTS; COMPUTATIONAL METHODS; SIMULATION PLATFORM;

EID: 84873325887     PISSN: 17441765     EISSN: 17441773     Source Type: Journal    
DOI: 10.1504/IJICS.2012.051777     Document Type: Article
Times cited : (6)

References (41)
  • 3
    • 84937340971 scopus 로고    scopus 로고
    • A plague of viruses: Biological, computer and marketing
    • Boase, J. and Wellman, B. (2001) 'A plague of viruses: biological, computer and marketing', Current Sociology, Vol. 49, No. 6, pp.39-55.
    • (2001) Current Sociology , vol.49 , Issue.6 , pp. 39-55
    • Boase, J.1    Wellman, B.2
  • 4
    • 50049087364 scopus 로고    scopus 로고
    • On mobile viruses exploiting messaging and bluetooth services
    • August 28-September 1
    • Bose, A. and Shin, K.G. (2006) 'On mobile viruses exploiting messaging and Bluetooth services', Securecomm and Workshops, August 28-September 1, pp.1-10.
    • (2006) Securecomm and Workshops , pp. 1-10
    • Bose, A.1    Shin, K.G.2
  • 6
    • 0037599474 scopus 로고    scopus 로고
    • The economic cost of publicly announced information security breaches: Empirical evidence from the stock market
    • IOS Press
    • Campbell, K., Gordon, L.A., Loeb, M.P. and Zhou, L. (2003) 'The economic cost of publicly announced information security breaches: empirical evidence from the stock market', Journal of Computer Security, IOS Press, Vol. 11, No. 3, pp.431-448.
    • (2003) Journal of Computer Security , vol.11 , Issue.3 , pp. 431-448
    • Campbell, K.1    Gordon, L.A.2    Loeb, M.P.3    Zhou, L.4
  • 8
    • 39549096209 scopus 로고    scopus 로고
    • Effectiveness of quarantine in worm epidemics
    • Istanbul, Turkey, 11-15 June
    • Chen, T. and Jamil, N. (2006) 'Effectiveness of quarantine in worm epidemics', ICC 2006, Istanbul, Turkey, 11-15 June.
    • (2006) ICC 2006
    • Chen, T.1    Jamil, N.2
  • 10
    • 84873390829 scopus 로고    scopus 로고
    • Department of Homeland Security, USA, November [online], [accessed 6 September 2012]
    • Department of Homeland Security (2009) 'A roadmap for cybersecurity research', Department of Homeland Security, USA, November [online] http://www.cyber.st.dhs.gov/docs/DHSCybersecurity-Roadmap.pdf [accessed 6 September 2012].
    • (2009) A Roadmap for Cybersecurity Research', Department of Homeland Security
  • 13
    • 84855260734 scopus 로고    scopus 로고
    • Genetic algorithm based internet worm propagation strategy modeling
    • Technologija, ISSN 1392-124X
    • Goranin, N. and Cenys, A. (2008) 'Genetic algorithm based internet worm propagation strategy modeling', Information Technology and Control, Technologija, ISSN 1392-124X.
    • (2008) Information Technology and Control
    • Goranin, N.1    Cenys, A.2
  • 14
    • 84873326186 scopus 로고    scopus 로고
    • InfoSecurity.com, 3 April [online], [accessed 6 March 2011]
    • InfoSecurity.com (2009) 'IBM warns over four percent Conficker infection rate', InfoSecurity.com, 3 April [online] http://www.infosecurity-magazine.com/ view/1065/ibm-warns-over-fourpercent-conficker-infection-rate/[accessed 6 March 2011].
    • (2009) IBM Warns over Four Percent Conficker Infection Rate
  • 18
    • 57049183421 scopus 로고    scopus 로고
    • Software Engineering Institute, Carnegie Mellon University and Department of Homeland Security National Cyber Security Division, 19 December [online], [accessed 9 March 2011]
    • Killcrece, G. (2005) 'Incident management', Software Engineering Institute, Carnegie Mellon University and Department of Homeland Security National Cyber Security Division, 19 December [online] https://buildsecurityin. us-cert.gov/bsi/articles/best-practices/incident/223-BSI.html [accessed 9 March 2011].
    • (2005) Incident Management
    • Killcrece, G.1
  • 21
    • 58049169669 scopus 로고    scopus 로고
    • Multi-agent model analysis of the containment strategy for avian influenza (AI) in South Korea
    • 3-5 November
    • Kim, T., Hwang, W., Zhang, A., Sen, S. and Ramanathan, M. (2008) 'Multi-agent model analysis of the containment strategy for avian influenza (AI) in South Korea', Bioinformatics and Biomedicine, BIBM '08, 3-5 November, p.335.
    • (2008) Bioinformatics and Biomedicine, BIBM '08 , pp. 335
    • Kim, T.1    Hwang, W.2    Zhang, A.3    Sen, S.4    Ramanathan, M.5
  • 23
    • 77957662699 scopus 로고    scopus 로고
    • Threshold smart walk for the containment of local worm outbreak
    • 30 November
    • Li, L., Liu, P. and Kesidis, G. (2008) 'Threshold smart walk for the containment of local worm outbreak', Global Telecommunications Conference, 30 November, pp.1-5.
    • (2008) Global Telecommunications Conference , pp. 1-5
    • Li, L.1    Liu, P.2    Kesidis, G.3
  • 24
    • 15744393608 scopus 로고    scopus 로고
    • Bitten by a bug: A case study in malware infection
    • Logan, P.Y. and Logan, S.W. (2003) 'Bitten by a bug: a case study in malware infection', Journal of Information Systems Education, Vol. 14, No. 4, pp.301-306.
    • (2003) Journal of Information Systems Education , vol.14 , Issue.4 , pp. 301-306
    • Logan, P.Y.1    Logan, S.W.2
  • 28
    • 78349246329 scopus 로고    scopus 로고
    • Devious Chatbots - interactive malware with a plot
    • Pan, J., Fung, C.C. and Koh, W.W. (2009) 'Devious Chatbots - interactive malware with a plot', FIRA 2009, CCIS 44, pp.110-118.
    • (2009) FIRA 2009, CCIS 44 , pp. 110-118
    • Pan, J.1    Fung, C.C.2    Koh, W.W.3
  • 29
    • 84873358575 scopus 로고    scopus 로고
    • 1 September [online], [accessed 6 March 2011]
    • Porras, P., Saidi, H. and Yegneswaran, V. (2010) 'Malware pandemics', Storming Media, 1 September [online] http://www.stormingmedia.us/66/6611/ A661135.html[accessed 6 March 2011].
    • (2010) 'Malware Pandemics
    • Porras, P.1    Saidi, H.2    Yegneswaran, V.3
  • 33
    • 77952903083 scopus 로고    scopus 로고
    • Verizon, 28 July [online], [accessed 2 March 2011]
    • Verizon (2010) '2010 data breach investigations report', Verizon Business, 28 July [online] http://www.verizonbusiness.com/go/ 2010databreachreport/[accessed 2 March 2011].
    • (2010) 2010 Data Breach Investigations Report
  • 37
    • 0141877349 scopus 로고    scopus 로고
    • Northwestern University, Evanston, IL [online], [accessed 1 March 2011]
    • Wilensky, U. (1999) 'NetLogo', Center for Connected Learning and Computer-Based Modeling, Northwestern University, Evanston, IL [online] http://ccl.northwestern.edu/netlogo/[accessed 1 March 2011].
    • (1999) NetLogo
    • Wilensky, U.1
  • 40
    • 33646150900 scopus 로고    scopus 로고
    • On the performance of internet worm scanning strategies
    • July
    • Zou, C.C., Towsley, D. and Gong, W. (2006) 'On the performance of internet worm scanning strategies', Performance Evaluation, July, Vol. 63, No. 7.
    • (2006) Performance Evaluation , vol.63 , Issue.7
    • Zou, C.C.1    Towsley, D.2    Gong, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.