메뉴 건너뛰기




Volumn 16, Issue 2, 2014, Pages 942-960

Modeling the propagation of worms in networks: A survey

Author keywords

Modeling; Network security; Propagation; Worms

Indexed keywords

MODELS; NETWORK SECURITY; SURVEYS; WAVE PROPAGATION;

EID: 84901195399     PISSN: None     EISSN: 1553877X     Source Type: Journal    
DOI: 10.1109/SURV.2013.100913.00195     Document Type: Article
Times cited : (162)

References (93)
  • 1
    • 0141762461 scopus 로고    scopus 로고
    • Code-red: A case study on the spread and victims of an internet worm
    • D. Moore, C. Shannon et al., "Code-red: a case study on the spread and victims of an internet worm," in Proc. 2nd ACM SIGCOMM Workshop on Internet measurment. ACM, 2002, pp. 273-284. [Online]. Available: http://dl.acm.org/citation.cfm?id=637244
    • (2002) Proc. 2nd ACM SIGCOMM Workshop on Internet Measurment. ACM , pp. 273-284
    • Moore, D.1    Shannon, C.2
  • 2
    • 84979745679 scopus 로고    scopus 로고
    • The code red worm
    • H. Berghel, "The code red worm," Commun. of the ACM, vol. 44, no. 12, pp. 15-19, 2001.
    • (2001) Commun. of the ACM , vol.44 , Issue.12 , pp. 15-19
    • Berghel, H.1
  • 4
    • 24344477444 scopus 로고    scopus 로고
    • Colleges brace for the next worm
    • A. L. Foster, "Colleges brace for the next worm," The Chronicle of Higher Education, vol. 50, no. 28, p. A29, 2004.
    • (2004) The Chronicle of Higher Education , vol.50 , Issue.28
    • Foster, A.L.1
  • 6
    • 84901222181 scopus 로고    scopus 로고
    • Symantec.
    • Symantec. ( 2008) W32.downadup (win32/conficker). [Online]. Available: http://www.symantec.com/security-response/writeup.jsp?docid=2008-112203-2408-99
    • (2008) W32.downadup (win32/conficker)
  • 7
    • 84901222175 scopus 로고    scopus 로고
    • (2010) W32.stuxnet, 2010. [Online]. Available: http://www.symantec.com/ security-response/writeup.jsp?docid=2010-071400-3123-99
    • (2010) W32.stuxnet, 2010
    • Weafer, V.1
  • 9
    • 65249107163 scopus 로고    scopus 로고
    • A simple and efficient hidden markov model scheme for host-based anomaly intrusion detection
    • J. Hu, X. Yu, D. Qiu, and H.-H. Chen, "A simple and efficient hidden markov model scheme for host-based anomaly intrusion detection," IEEE Network, vol. 23, no. 1, pp. 42-47, 2009. [Online]. Available: http://ieeexplore.ieee.org/xpls/abs-all.jsp?arnumber=4804323
    • (2009) IEEE Network , vol.23 , Issue.1 , pp. 42-47
    • Hu, J.1    Yu, X.2    Qiu, D.3    Chen, H.-H.4
  • 12
    • 58849141571 scopus 로고    scopus 로고
    • Modeling propagation dynamics of bluetooth worms (extended version)
    • G. Yan and S. Eidenbenz, "Modeling propagation dynamics of bluetooth worms (extended version)," IEEE Trans. Mobile Computing, vol. 8, no. 3, pp. 353-368, 2009. [Online]. Available: http://ieeexplore.ieee.org/xpls/abs-all. jsp?arnumber=4624266
    • (2009) IEEE Trans. Mobile Computing , vol.8 , Issue.3 , pp. 353-368
    • Yan, G.1    Eidenbenz, S.2
  • 13
    • 77955517954 scopus 로고    scopus 로고
    • Modeling the propagation of peer-to-peer worms
    • X. Fan and Y Xiang, "Modeling the propagation of peer-to-peer worms," Future generation computer systems, vol. 26, no. 8, pp. 1433-1443, 2010. [Online]. Available: http://www.sciencedirect.com/science/article/pii/ S0167739X10000737
    • (2010) Future Generation Computer Systems , vol.26 , Issue.8 , pp. 1433-1443
    • Fan, X.1    Xiang, Y.2
  • 14
    • 34248995311 scopus 로고    scopus 로고
    • Modeling and simulation study of the propagation and defense of internet e-mail worms
    • C. C. Zou, D. Towsley, and W. Gong, "Modeling and simulation study of the propagation and defense of internet e-mail worms," IEEE Trans. Dependable and Secure Computing, vol. 4, no. 2, pp. 105-118, 2007. [Online]. Available: http://ieeexplore.ieee.org/xpls/abs-all.jsp?arnumber=4198176
    • (2007) IEEE Trans. Dependable and Secure Computing , vol.4 , Issue.2 , pp. 105-118
    • Zou, C.C.1    Towsley, D.2    Gong, W.3
  • 16
    • 33846607334 scopus 로고    scopus 로고
    • Importance-scanning worm using vulnerable-host distribution
    • IEEE
    • Z. Chen and C. Ji, "Importance-scanning worm using vulnerable-host distribution," in IEEE Global Telecommunications Conf, 2005. GLOBECOM'05., vol. 3. IEEE, 2005, pp. 6-pp. [Online]. Available: http://ieeexplore.ieee.org/ xpls/abs-all.jsp?arnumber=1577955
    • (2005) IEEE Global Telecommunications Conf, 2005. GLOBECOM'05. , vol.3 , pp. 6
    • Chen, Z.1    Ji, C.2
  • 17
    • 34548366188 scopus 로고    scopus 로고
    • Optimal worm-scanning method using vulnerable-host distributions
    • "Optimal worm-scanning method using vulnerable-host distributions," Int. J. Secur. Netw., vol. 2, no. 1/2, pp. 71-80, 2007.
    • (2007) Int. J. Secur. Netw. , vol.2 , Issue.1-2 , pp. 71-80
    • Chen, Z.1    Ji, C.2
  • 18
    • 51249086020 scopus 로고    scopus 로고
    • A closed-form expression for static worm-scanning strategies
    • Z. Chen and C. Chen, "A closed-form expression for static worm-scanning strategies," in IEEE Int. Conf. Commun., 2008. ICC'08. IEEE, 2008, pp. 1573-1577. [Online]. Available: http://ieeexplore.ieee.org/xpls/abs- all.jsp?arnumber=4533340
    • (2008) IEEE Int. Conf. Commun., 2008. ICC'08. IEEE , pp. 1573-1577
    • Chen, Z.1    Chen, C.2
  • 21
    • 39049123320 scopus 로고    scopus 로고
    • On detecting camouflaging worm
    • DOI 10.1109/ACSAC.2006.36, 4041170, Proceedings - Annual Computer Security Applications Conference, ACSAC
    • W. Yu, X. Wang, P. Calyam, D. Xuan, and W. Zhao, "On detecting camouflaging worm," in Computer Security Applications Conf, 2006. ACSAC'06. 22nd Annu. IEEE, 2006, pp. 235-244. [Online]. Available: http://ieeexplore. ieee.org/xpls/abs-all.jsp?arnumber=4041170 (Pubitemid 351232918)
    • (2006) Proceedings - Annual Computer Security Applications Conference, ACSAC , pp. 235-244
    • Yu, W.1    Wang, X.2    Calyam, P.3    Xuan, D.4    Zhao, W.5
  • 24
    • 76549110008 scopus 로고    scopus 로고
    • Defending against the propagation of active worms
    • X. Fan and Y Xiang, "Defending against the propagation of active worms," The Journal of Supercomputing, vol. 51, no. 2, pp. 167-200, 2010. [Online]. Available: http://link.springer.com/article/10.1007/s11227-009-0283-8
    • (2010) The Journal of Supercomputing , vol.51 , Issue.2 , pp. 167-200
    • Fan, X.1    Xiang, Y.2
  • 25
    • 71849119546 scopus 로고    scopus 로고
    • Concept, characteristics and defending mechanism of worms
    • T. Yong, L. Jiaqing, X. Bin, and W. Guiyi, "Concept, characteristics and defending mechanism of worms," IEICE TRANS. Information and Systems, vol. 92, no. 5, pp. 799-809, 2009. [Online]. Available: http://search.ieice.org/ bin/summary.php?id=e92-d-5-799
    • (2009) IEICE TRANS. Information and Systems , vol.92 , Issue.5 , pp. 799-809
    • Yong, T.1    Jiaqing, L.2    Bin, X.3    Guiyi, W.4
  • 26
    • 77953145744 scopus 로고    scopus 로고
    • A survey of internet worm detection and containment
    • P. Li, M. Salour, and X. Su, "A survey of internet worm detection and containment," IEEE Commun. Surveys & Tutorials, vol. 10, no. 1, pp. 20-35, 2008. [Online]. Available: http://ieeexplore.ieee.org/xpls/abs-all.jsp? arnumber=4483668
    • (2008) IEEE Commun. Surveys & Tutorials , vol.10 , Issue.1 , pp. 20-35
    • Li, P.1    Salour, M.2    Su, X.3
  • 28
    • 17444431614 scopus 로고    scopus 로고
    • Worm propagation and generic attacks
    • DOI 10.1109/MSP.2005.57
    • E. Levy, "Worm propagation and generic attacks," IEEE Security & Privacy, vol. 3, no. 2, pp. 63-65, 2005. [Online]. Available: http://ieeexplore.ieee. org/xpls/abs-all.jsp?arnumber=1423964 (Pubitemid 40542064)
    • (2005) IEEE Security and Privacy , vol.3 , Issue.2 , pp. 63-65
    • Levy, E.1
  • 29
    • 4344627335 scopus 로고    scopus 로고
    • The spread of the witty worm
    • C. Shannon and D. Moore, "The spread of the witty worm," IEEE Security & Privacy, vol. 2, no. 4, pp. 46-50, 2004. [Online]. Available: http://ieeexplore.ieee. org/xpls/abs-all.jsp?arnumber=1324598
    • (2004) IEEE Security & Privacy , vol.2 , Issue.4 , pp. 46-50
    • Shannon, C.1    Moore, D.2
  • 30
    • 21844451704 scopus 로고    scopus 로고
    • Symantec.
    • Symantec. (2004) W32.sasser.worm. [Online]. Available: http://www.symantec.com/security-response/writeup.jsp?docid=2004-050116-1831-99.
    • (2004) W32.sasser.worm
  • 32
    • 84901222173 scopus 로고    scopus 로고
    • F-Secure.
    • F-Secure. (2011) Love letter virus. [Online]. Available: http://www.f-secure.com/v-descs/love.shtml.
    • (2011) Love Letter Virus
  • 33
    • 84901222174 scopus 로고    scopus 로고
    • Iloveyou virus lessons learned report. Army Forces Command
    • Iloveyou virus lessons learned report. Army Forces Command. [Online]. Available: http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA415104&Location= U2&doc=GetTRDoc.pdf
  • 34
    • 84901222165 scopus 로고    scopus 로고
    • Symantec.
    • Symantec. (2001) W32.sircam.worm. [Online]. Available: http://www.symantec.com/security-response/writeup.jsp?docid=2001-071720-1640- 99&tabid=2
    • (2001) W32.sircam.worm
  • 37
    • 33646150900 scopus 로고    scopus 로고
    • On the performance of internet worm scanning strategies
    • C. C. Zou, D. Towsley, and W. Gong, "On the performance of internet worm scanning strategies," Performance Evaluation, vol. 63, no. 7, pp. 700-723, 2006. [Online]. Available: http://www.sciencedirect.com/science/ article/pii/S0166531605001112
    • (2006) Performance Evaluation , vol.63 , Issue.7 , pp. 700-723
    • Zou, C.C.1    Towsley, D.2    Gong, W.3
  • 38
    • 26844507894 scopus 로고    scopus 로고
    • Routing worm: A fast, selective attack worm based on IP address information
    • Proceedings - Workshop on Principles of Advanced and Distributed Simulation, PADS 2005
    • C. C. Zou, D. Towsley, W. Gong, and S. Cai, "Routing worm: A fast, selective attack worm based on ip address information," in Proc. 19th Workshop on Principles of Advanced and Distributed Simulation. IEEE Computer Society, 2005, pp. 199-206. [Online]. Available: http://dl.acm.org/citation.cfm? id=1070175 (Pubitemid 41451138)
    • (2005) Proceedings - Workshop on Principles of Advanced and Distributed Simulation, PADS , pp. 199-206
    • Zou, C.C.1    Towsley, D.2    Gong, W.3    Cai, S.4
  • 40
    • 33748372756 scopus 로고    scopus 로고
    • Stochastic behavior of random constant scanning worms
    • DOI 10.1109/ICCCN.2005.1523881, 1523881, Proceedings - 14th International Conference on Computer Communications and Networks, ICCCN 2005
    • K. R. Rohloff and T. Basar, "Stochastic behavior of random constant scanning worms," in Comput. Commun. Netw., 2005. ICCCN 2005. Proc. 14th Int. Conf. IEEE, 2005, pp. 339-344. [Online]. Available: http://ieeexplore.ieee. org/xpls/abs-all.jsp?arnumber=1523881 (Pubitemid 44335336)
    • (2005) Proceedings - International Conference on Computer Communications and Networks, ICCCN , vol.2005 , pp. 339-344
    • Rohloff, K.R.1    Basar, T.2
  • 41
    • 43649100273 scopus 로고    scopus 로고
    • Modeling and automated containment of worms
    • DOI 10.1109/TDSC.2007.70230, 4358715
    • S. H. Sellke, N. B. Shroff, and S. Bagchi, "Modeling and automated containment of worms," IEEE Trans. Dependable and Secure Computing, vol. 5, no. 2, pp. 71-86, 2008. [Online]. Available: http://ieeexplore.ieee. org/xpls/abs-all.jsp?arnumber=4358715 (Pubitemid 351681550)
    • (2008) IEEE Transactions on Dependable and Secure Computing , vol.5 , Issue.2 , pp. 71-86
    • Sellke, S.H.1    Shroff, N.B.2    Bagchi, S.3
  • 42
    • 80053479500 scopus 로고    scopus 로고
    • The microcosmic model of worm propagation
    • 2011
    • Y Wang, S. Wen, S. Cesare, W Zhou, and Y Xiang, "The microcosmic model of worm propagation," The Computer Journal, vol. 54, no. 10, pp. 1700-1720, 2011. [Online]. Available: http://comjnl.oxfordjournals.org/content/ 54/10/1700.short
    • The Computer Journal , vol.54 , Issue.10 , pp. 1700-1720
    • Wang, Y.1    Wen, S.2    Cesare, S.3    Zhou, W.4    Xiang, Y.5
  • 44
    • 84901222167 scopus 로고    scopus 로고
    • A brief history of the worm
    • N. Weaver, "A brief history of the worm," Security Focus Online, vol. 26, 2001.
    • (2001) Security Focus Online , vol.26
    • Weaver, N.1
  • 45
    • 39049092655 scopus 로고    scopus 로고
    • Epidemiological modelling of peer-to-peer viruses and pollution
    • R. W. Thommes and M. Coates, "Epidemiological modelling of peer-to-peer viruses and pollution." in INFOCOM, vol. 6, 2006, pp. 1-12.
    • (2006) INFOCOM , vol.6 , pp. 1-12
    • Thommes, R.W.1    Coates, M.2
  • 46
    • 78649317337 scopus 로고    scopus 로고
    • Online social networksparadise of computer viruses
    • 2011
    • W. Fan and K. Yeung, "Online social networksparadise of computer viruses," Physica A: Statistical Mechanics and its Applications, vol. 390, no. 2, pp. 189-197, 2011. [Online]. Available: http://www.sciencedirect.com/ science/article/pii/S0378437110008344
    • Physica A: Statistical Mechanics and Its Applications , vol.390 , Issue.2 , pp. 189-197
    • Fan, W.1    Yeung, K.2
  • 47
    • 84901222168 scopus 로고    scopus 로고
    • W32.koobface
    • W32.koobface. [Online]. Available: http://www.symantec.com/security- response/writeup.jsp?docid=2008-080315-0217-99.
  • 52
    • 34147159602 scopus 로고    scopus 로고
    • Impact of non-poissonian activity patterns on spreading processes
    • A. Vazquez, B. Racz, A. Lukacs, and A.-L. Barabasi, "Impact of non-poissonian activity patterns on spreading processes," Physical review letters, vol. 98, no. 15, p. 158702, 2007. [Online]. Available: http://prl.aps.org/abstract/PRL/v98/i15/e158702
    • (2007) Physical Review Letters , vol.98 , Issue.15 , pp. 158702
    • Vazquez, A.1    Racz, B.2    Lukacs, A.3    Barabasi, A.-L.4
  • 54
    • 84990671447 scopus 로고
    • A critical point for random graphs with a given degree sequence
    • wiley.com/doi/10.1002/rsa.3240060204/full
    • M. Molloy and B. Reed, "A critical point for random graphs with a given degree sequence," Random structures & algorithms, vol. 6, no. 2-3, pp. 161-180, 1995. [Online]. Available: http://onlinelibrary.wiley.com/doi/ 10.1002/rsa.3240060204/full
    • (1995) Random Structures & Algorithms , vol.6 , Issue.2-3 , pp. 161-180
    • Molloy, M.1    Reed, B.2
  • 55
    • 0032286776 scopus 로고    scopus 로고
    • The Size of the Giant Component of a Random Graph with a Given Degree Sequence
    • "The size of the giant component of a random graph with a given degree sequence," Combinatorics probability and computing, vol. 7, no. 3, pp. 295-305, 1998. [Online]. Available: http://journals.cambridge.org/ production/action/cjoGetFulltext?fulltextid =46636 (Pubitemid 128480814)
    • (1998) Combinatorics Probability and Computing , vol.7 , Issue.3 , pp. 295-305
    • Molloy, M.1    Reed, B.2
  • 56
    • 0032482432 scopus 로고    scopus 로고
    • Collective dynamics of small-worldnetworks
    • D. J. Watts and S. H. Strogatz, "Collective dynamics of small-worldnetworks," nature, vol. 393, no. 6684, pp. 440-442, 1998. [Online]. Available: http://www.nature.com/nature/journal/v393/n6684/abs/ 393440a0.html
    • (1998) Nature , vol.393 , Issue.6684 , pp. 440-442
    • Watts, D.J.1    Strogatz, S.H.2
  • 58
    • 70849133146 scopus 로고    scopus 로고
    • Analysis of a location-based social network
    • IEEE
    • N. Li and G. Chen, "Analysis of a location-based social network," in Computational Science and Engineering, 2009. CSE'09. Int. Conf, vol. 4. IEEE, 2009, pp. 263-270. [Online]. Available: http://ieeexplore. ieee.org/xpls/abs-all.jsp?arnumber=5284112
    • (2009) Computational Science and Engineering, 2009. CSE'09. Int. Conf , vol.4 , pp. 263-270
    • Li, N.1    Chen, G.2
  • 59
    • 11444254729 scopus 로고    scopus 로고
    • Modeling peer-to-peer network topologies through small-world models and power laws
    • M. Jovanovic, F. Annexstein, and K. Berman, "Modeling peer-to-peer network topologies through small-world models and power laws," in IX Telecommunications Forum, TELFOR, 2001, pp. 1-4.
    • (2001) IX Telecommunications Forum, TELFOR , pp. 1-4
    • Jovanovic, M.1    Annexstein, F.2    Berman, K.3
  • 60
    • 33847164488 scopus 로고    scopus 로고
    • A social network caught in the web
    • L. Adamic, O. Buyukkokten, and E. Adar, "A social network caught in the web," First Monday, vol. 8, no. 6, 2003. [Online]. Available: http://ojs-prod-lib.cc.uic.edu/ojs/index.php/fm/article/view/1057
    • (2003) First Monday , vol.8 , Issue.6
    • Adamic, L.1    Buyukkokten, O.2    Adar, E.3
  • 61
    • 79960530721 scopus 로고    scopus 로고
    • Structure and evolution of online social networks
    • Springer
    • R. Kumar, J. Novak, and A. Tomkins, "Structure and evolution of online social networks," in Link Mining: Models, Algorithms, and Applications. Springer, 2010, pp. 337-357. [Online]. Available: http://link.springer.com/chapter/10.1007/978-1-4419-6515-8-13
    • (2010) Link Mining: Models, Algorithms, and Applications , pp. 337-357
    • Kumar, R.1    Novak, J.2    Tomkins, A.3
  • 62
    • 35348871999 scopus 로고    scopus 로고
    • Analysis of topological characteristics of huge online social networking services
    • DOI 10.1145/1242572.1242685, 16th International World Wide Web Conference, WWW2007
    • Y.-Y. Ahn, S. Han, H. Kwak, S. Moon, and H. Jeong, "Analysis of topological characteristics of huge online social networking services," in Proc. 16th int. conf. on World Wide Web. ACM, 2007, pp. 835-844. [Online]. Available: http://dl.acm.org/citation.cfm?id=1242685 (Pubitemid 47582313)
    • (2007) 16th International World Wide Web Conference, WWW2007 , pp. 835-844
    • Ahn, Y.-Y.1    Han, S.2    Kwak, H.3    Moon, S.4    Jeong, H.5
  • 63
    • 84874263116 scopus 로고    scopus 로고
    • Influence diffusion dynamics and influence maximization in social networks with friend and foe relationships
    • Y Li, W. Chen, Y Wang, and Z.-L. Zhang, "Influence diffusion dynamics and influence maximization in social networks with friend and foe relationships," in Proc. 6th ACM int. conf. on Web search and data mining. ACM, 2013, pp. 657-666. [Online]. Available: http://dl.acm.org/citation.cfm?id= 2433478
    • (2013) Proc. 6th ACM Int. Conf. on Web Search and Data Mining. ACM , pp. 657-666
    • Li, Y.1    Chen, W.2    Wang, Y.3    Zhang, Z.-L.4
  • 64
    • 84867844406 scopus 로고    scopus 로고
    • On modeling product advertisement in large-scale online social networks
    • 2012
    • Y Li, B. Q. Zhao, and J. Lui, "On modeling product advertisement in large-scale online social networks," IEEE/ACM Trans. Netw. (TON), vol. 20, no. 5, pp. 1412-1425, 2012. [Online]. Available: http://dl.acm.org/citation.cfm? id=2428703
    • IEEE/ACM Trans. Netw. (TON) , vol.20 , Issue.5 , pp. 1412-1425
    • Li, Y.1    Zhao, B.Q.2    Lui, J.3
  • 66
    • 0033297068 scopus 로고    scopus 로고
    • Trawling the web for emerging cyber-communities
    • R. Kumar, P. Raghavan, S. Rajagopalan, and A. Tomkins, "Trawling the web for emerging cyber-communities," Computer networks, vol. 31, no. 11, pp. 1481-1493, 1999. [Online]. Available: http://www.sciencedirect.com/science/ article/pii/S1389128699000407
    • (1999) Computer Networks , vol.31 , Issue.11 , pp. 1481-1493
    • Kumar, R.1    Raghavan, P.2    Rajagopalan, S.3    Tomkins, A.4
  • 67
    • 0038483826 scopus 로고    scopus 로고
    • Emergence of scaling in random networks
    • A.-L. Barabási and R. Albert, "Emergence of scaling in random networks," science, vol. 286, no. 5439, pp. 509-512, 1999. [Online]. Available: http://www.sciencemag.org/content/286/5439/509.short
    • (1999) Science , vol.286 , Issue.5439 , pp. 509-512
    • Barabási, A.-L.1    Albert, R.2
  • 68
    • 26844473415 scopus 로고    scopus 로고
    • Spatial-temporal modeling of malware propagation in networks
    • DOI 10.1109/TNN.2005.853425
    • Z. Chen and C. Ji, "Spatial-temporal modeling of malware propagation in networks," IEEE Trans. Neural Netw., vol. 16, no. 5, pp. 1291-1303, 2005. [Online]. Available: http://ieeexplore.ieee.org/xpls/abs-all.jsp?arnumber= 1510727 (Pubitemid 41444629)
    • (2005) IEEE Transactions on Neural Networks , vol.16 , Issue.5 , pp. 1291-1303
    • Chen, Z.1    Ji, C.2
  • 69
    • 84862814724 scopus 로고    scopus 로고
    • Locating defense positions for thwarting the propagation of topological worms
    • 2012
    • S. Wen, W. Zhou, Y Wang, W Zhou, and Y Xiang, "Locating defense positions for thwarting the propagation of topological worms," IEEE Commun. Lett., vol. 16, no. 4, pp. 560-563, 2012. [Online]. Available: http://ieeexplore.ieee. org/xpls/abs-all.jsp?arnumber=6168149
    • IEEE Commun. Lett. , vol.16 , Issue.4 , pp. 560-563
    • Wen, S.1    Zhou, W.2    Wang, Y.3    Zhou, W.4    Xiang, Y.5
  • 71
    • 84880054920 scopus 로고    scopus 로고
    • Modeling propagation dynamics of social network worms
    • S. Wen, W Zhou, J. Zhang, Y Xiang, and W. Jia, "Modeling propagation dynamics of social network worms," IEEE Trans. Parallel Distrib. Syst., 2012. [Online]. Available: http://ieeexplore.ieee.org/xpls/abs-all.jsp?arnumber= 6287505
    • (2012) IEEE Trans. Parallel Distrib. Syst.
    • Wen, S.1    Zhou, W.2    Zhang, J.3    Xiang, Y.4    Jia, W.5
  • 72
    • 0000494582 scopus 로고    scopus 로고
    • Epidemic outbreaks in complex heterogeneous networks
    • DOI 10.1007/s10051-002-8996-y
    • Y Moreno, R. Pastor-Satorras, and A. Vespignani, "Epidemic outbreaks in complex heterogeneous networks," The European Physical Journal B-Condensed Matter and Complex Systems, vol. 26, no. 4, pp. 521-529, 2002. [Online]. Available: http://link. springer.com/article/10.1140/epjb/e20020122 (Pubitemid 135698247)
    • (2002) European Physical Journal B , vol.26 , Issue.4 , pp. 521-529
    • Moreno, Y.1    Pastor-Satorras, R.2    Vespignani, A.3
  • 73
    • 79955073428 scopus 로고    scopus 로고
    • Network immunization and virus propagation in email networks: Experimental evaluation and analysis
    • 2011
    • C. Gao, J. Liu, and N. Zhong, "Network immunization and virus propagation in email networks: experimental evaluation and analysis," Knowledge and information systems, vol. 27, no. 2, pp. 253-279, 2011. [Online]. Available: http://link.springer.com/article/10.1007/s10115-010-0321-0
    • Knowledge and Information Systems , vol.27 , Issue.2 , pp. 253-279
    • Gao, C.1    Liu, J.2    Zhong, N.3
  • 74
    • 70350397571 scopus 로고    scopus 로고
    • Sisr-a new model for epidemic spreading of electronic threats
    • Springer
    • B. Rozenberg, E. Gudes, and Y Elovici, "Sisr-a new model for epidemic spreading of electronic threats," in Information Security. Springer, 2009, pp. 242-249. [Online]. Available: http://link.springer.com/ chapter/10.1007/978-3-642-04474-8-20
    • (2009) Information Security , pp. 242-249
    • Rozenberg, B.1    Gudes, E.2    Elovici, Y.3
  • 75
    • 80052853005 scopus 로고    scopus 로고
    • Eliminating errors in worm propagation models
    • 2011
    • Y Wang, S. Wen, S. Cesare, W. Zhou, and Y Xiang, "Eliminating errors in worm propagation models," IEEE Commun. Lett., vol. 15, no. 9, pp. 1022-1024, 2011. [Online]. Available: http://ieeexplore.ieee.org/xpls/abs-all. jsp?arnumber=5958564
    • IEEE Commun. Lett. , vol.15 , Issue.9 , pp. 1022-1024
    • Wang, Y.1    Wen, S.2    Cesare, S.3    Zhou, W.4    Xiang, Y.5
  • 76
    • 33750290186 scopus 로고    scopus 로고
    • Systematic topology analysis and generation using degree correlations
    • DOI 10.1145/1151659.1159930
    • P. Mahadevan, D. Krioukov, K. Fall, and A. Vahdat, "Systematic topology analysis and generation using degree correlations," ACM SIGCOMM Comput. Commun. Review, vol. 36, no. 4, pp. 135-146, 2006. [Online]. Available: http://dl.acm.org/citation.cfm?id=1159930 (Pubitemid 44623722)
    • (2006) Computer Communication Review , vol.36 , Issue.4 , pp. 135-146
    • Mahadevan, P.1    Krioukov, D.2    Fall, K.3    Vahdat, A.4
  • 77
    • 34548312516 scopus 로고    scopus 로고
    • Information survival threshold in sensor and P2P networks
    • DOI 10.1109/INFCOM.2007.156, 4215738, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
    • D. Chakrabarti, J. Leskovec, C. Faloutsos, S. Madden, C. Guestrin, and M. Faloutsos, "Information survival threshold in sensor and p2p networks," in INFOCOM 2007. 26th IEEE Int. Conf. Comput. Commun. IEEE, 2007, pp. 1316-1324. [Online]. Available: http://ieeexplore.ieee. org/xpls/abs-all.jsp?arnumber=4215738 (Pubitemid 47334356)
    • (2007) Proceedings - IEEE INFOCOM , pp. 1316-1324
    • Chakrabarti, D.1    Leskovec, J.2    Faloutsos, C.3    Madden, S.4    Guestrin, C.5    Faloutsos, M.6
  • 79
    • 0035794256 scopus 로고    scopus 로고
    • Epidemic spreading in scale-free networks
    • R. Pastor-Satorras and A. Vespignani, "Epidemic spreading in scale-free networks," Physical review letters, vol. 86, no. 14, p. 3200, 2001. [Online]. Available: http://prl.aps.org/abstract/PRL/v86/i14/p3200-1
    • (2001) Physical Review Letters , vol.86 , Issue.14 , pp. 3200
    • Pastor-Satorras, R.1    Vespignani, A.2
  • 80
    • 0242411922 scopus 로고    scopus 로고
    • Epidemic incidence in correlated complex networks
    • Y Moreno, J. B. Gomez, and A. F. Pacheco, "Epidemic incidence in correlated complex networks," Physical Review E, vol. 68, no. 3, p. 035103, 2003. [Online]. Available: http://pre.aps.org/abstract/PRE/v68/i3/e035103
    • (2003) Physical Review e , vol.68 , Issue.3 , pp. 035103
    • Moreno, Y.1    Gomez, J.B.2    Pacheco, A.F.3
  • 81
    • 2442553392 scopus 로고    scopus 로고
    • The Cooperate Association for Internet Data Analysis
    • D. Moore, "Caida analysis of code-red," The Cooperate Association for Internet Data Analysis, 2001.
    • (2001) Caida Analysis of Code-red
    • Moore, D.1
  • 88
    • 0042526015 scopus 로고    scopus 로고
    • Measuring the size of the internet via importance sampling
    • S. Xing and B.-P. Paris, "Measuring the size of the internet via importance sampling," IEEE J. Sel. Areas Commun., vol. 21, no. 6, pp. 922-933, 2003. [Online]. Available: http://ieeexplore.ieee.org/xpls/abs-all.jsp? arnumber=1217278
    • (2003) IEEE J. Sel. Areas Commun. , vol.21 , Issue.6 , pp. 922-933
    • Xing, S.1    Paris, B.-P.2
  • 89
    • 84891429894 scopus 로고    scopus 로고
    • Modeling botnet propagation using time zones
    • D. Dagon, C. C. Zou, and W. Lee, "Modeling botnet propagation using time zones." in NDSS, vol. 6, 2006, pp. 2-13.
    • (2006) NDSS , vol.6 , pp. 2-13
    • Dagon, D.1    Zou, C.C.2    Lee, W.3
  • 90
    • 84857094853 scopus 로고    scopus 로고
    • Detecting computer worms in the cloud
    • Springer
    • S. Biedermann and S. Katzenbeisser, "Detecting computer worms in the cloud," in Open Problems in Network Security. Springer, 2012, pp. 43-54. [Online]. Available: http://link.springer.com/chapter/10.1007/978-3-642-27585-2- 4
    • (2012) Open Problems in Network Security , pp. 43-54
    • Biedermann, S.1    Katzenbeisser, S.2
  • 91
    • 84944386303 scopus 로고    scopus 로고
    • When virtual is harder than real: Security challenges in virtual machine based computing environments
    • T. Garfinkel and M. Rosenblum, "When virtual is harder than real: Security challenges in virtual machine based computing environments." in HotOS, 2005.
    • (2005) HotOS
    • Garfinkel, T.1    Rosenblum, M.2
  • 92
    • 84872795827 scopus 로고    scopus 로고
    • Modeling and restraining mobile virus propagation
    • C. Gao and J. Liu, "Modeling and restraining mobile virus propagation," IEEE Trans. Mob. Compu, 2013. [Online]. Available: http://ieeexplore.ieee.org/xpls/abs-all.jsp?arnumber=6138859
    • (2013) IEEE Trans. Mob. Compu
    • Gao, C.1    Liu, J.2
  • 93
    • 27644462218 scopus 로고    scopus 로고
    • Epidemic spreading in real networks: An eigenvalue viewpoint
    • Proceedings - 22nd International Symposium on Reliable Distributed Systems, SRDS 2003
    • Y. Wang, D. Chakrabarti, C. Wang, and C. Faloutsos, "Epidemic spreading in real networks: An eigenvalue viewpoint," in Reliable Distributed Systems, 2003. Proc. 22nd Int. Symp. IEEE, 2003, pp. 25-34. [Online]. Available: http://ieeexplore.ieee.org/xpls/abs-all.jsp?arnumber= 1238052 (Pubitemid 41554102)
    • (2003) Proceedings of the IEEE Symposium on Reliable Distributed Systems , pp. 25-34
    • Wang, Y.1    Chakrabarti, D.2    Wang, C.3    Faloutsos, C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.