메뉴 건너뛰기




Volumn 78, Issue 5, 2019, Pages 443-464

Intelligent simulation of network worm propagation using the code red as an example

Author keywords

Agent based simulation; Code Red; Multiagent simulation; Network virus simulation; Network worm

Indexed keywords

EPIDEMIOLOGY; HETEROGENEOUS NETWORKS; MULTI AGENT SYSTEMS; NETWORK CODING;

EID: 85140821279     PISSN: 00402508     EISSN: 19436009     Source Type: Journal    
DOI: 10.1615/TelecomRadEng.v78.i5.60     Document Type: Article
Times cited : (33)

References (31)
  • 1
    • 85065325911 scopus 로고    scopus 로고
    • Analytical models of network worm propagation
    • SPb.: Nauka, in Russian
    • Kotenko, I.V. and Vorontsov, V.V., (2007) Analytical Models of Network Worm Propagation, SPIIRAS Proceedings, SPb.: Nauka, (in Russian).
    • (2007) SPIIRAS Proceedings
    • Kotenko, I.V.1    Vorontsov, V.V.2
  • 2
    • 85056374562 scopus 로고    scopus 로고
    • Stochastic modeling of cash flow for personal insurance fund using the cloud data storage
    • Bazilevych, K. et al., (2018) Stochastic modeling of cash flow for personal insurance fund using the cloud data storage, International Journal of Computing, 17(3), pp. 153-162.
    • (2018) International Journal of Computing , vol.17 , Issue.3 , pp. 153-162
    • Bazilevych, K.1
  • 6
    • 26944469458 scopus 로고    scopus 로고
    • Point-set methods of clusterization of standard information
    • Mashtalir, V.P. and Yakovlev, S.V., (2001) Point-set methods of clusterization of standard information, Cybernetics and Systems Analysis, 37(3), pp. 295-307.
    • (2001) Cybernetics and Systems Analysis , vol.37 , Issue.3 , pp. 295-307
    • Mashtalir, V.P.1    Yakovlev, S.V.2
  • 7
    • 0034486891 scopus 로고    scopus 로고
    • The mathematics of infectious diseases
    • Hethcote, H.W., (2000) The Mathematics of Infectious Diseases, SIAM Review, 42(4), pp. 599-653.
    • (2000) SIAM Review , vol.42 , Issue.4 , pp. 599-653
    • Hethcote, H.W.1
  • 9
    • 21244446222 scopus 로고    scopus 로고
    • Biologically inspired approaches to computer security
    • HP Labs Bristol, UK
    • Williamson, M.M., (2007) Biologically inspired approaches to computer security, HP Labs Technical Report HPL-2002-131, 10 p., HP Labs Bristol, UK., http://www.hpl.hp.com/techreports/2002/HPL2002-131.html.
    • (2007) HP Labs Technical Report HPL-2002-131 , pp. 10
    • Williamson, M.M.1
  • 12
    • 85084162258 scopus 로고    scopus 로고
    • How to own the Internet in your spare time
    • San Francisco
    • Staniford, S., Paxson, V., and Weaver, N., (2002) How to own the Internet in your spare time, 11th Usenix Security Symposium, 19 p., San Francisco, http://www.icir.org/vern/papers/cdc-usenixsec02.
    • (2002) 11th Usenix Security Symposium , pp. 19
    • Staniford, S.1    Paxson, V.2    Weaver, N.3
  • 14
    • 2442553392 scopus 로고    scopus 로고
    • Cooperative Association for Internet Data Analysis CAIDA Web Site, University of California’s San Diego Supercomputer Center, 25 Aug
    • CAIDA Analysis of Code-Red, Cooperative Association for Internet Data Analysis CAIDA Web Site, University of California’s San Diego Supercomputer Center, 25 Aug 2001 http://www.caida.org/analysis/security/code-red.
    • (2001) CAIDA Analysis of Code-Red
  • 16
    • 2642584593 scopus 로고    scopus 로고
    • CERT Advisory CA-2001-19 CERT Coordination Center Web Site, Carnegie Mellon Software Engineering Center, 19 Jul
    • CERT Advisory CA-2001-19, “Code Red” Worm Exploiting Buffer Overflow in IIS Indexing Service DLL, CERT Coordination Center Web Site, Carnegie Mellon Software Engineering Center, 19 Jul 2001 http://www.cert.org/advisories/CA-2001-19.html.
    • (2001) Code Red” Worm Exploiting Buffer Overflow in IIS Indexing Service DLL
  • 17
    • 4244165283 scopus 로고    scopus 로고
    • CERT Advisory CA-2001-23, Worm, CERT Coordination Center Web Site, Carnegie Mellon Software Engineering Center, 26 Jul
    • CERT Advisory CA-2001-23, Continued Threat of the “Code Red” Worm, CERT Coordination Center Web Site, Carnegie Mellon Software Engineering Center, 26 Jul 2001 http://www.cert.org/advisories/CA-2001-23.html.
    • (2001) Continued Threat of the “Code Red
  • 18
    • 85141903148 scopus 로고    scopus 로고
    • CNN Web Site, 1 Aug
    • “Code Red” Worm Spreads, Pentagon Reacts, CNN Web Site, 1 Aug 2001 http://www.cnn.com/2001/TECH/internet/08/01/code.red/index.html.
    • (2001) Code Red” Worm Spreads, Pentagon Reacts
  • 19
    • 0141762461 scopus 로고    scopus 로고
    • Code-ReD: A case study on the spread and victims of an Internet worm
    • Moore, D., Shannon, C., and Brown, J., (2002) Code-Red: a case study on the spread and victims of an Internet worm, Internet Measurement Workshop (IMW), pp. 273-284.
    • (2002) Internet Measurement Workshop (IMW) , pp. 273-284
    • Moore, D.1    Shannon, C.2    Brown, J.3
  • 22
    • 84855519936 scopus 로고    scopus 로고
    • The N-intertwined SIS epidemic network model
    • Springer
    • Mieghem, P.V., (2011) The N-intertwined SIS epidemic network model, P. Computing, 93: 147, pp. 147-169, Springer.
    • (2011) P. Computing , vol.93 , Issue.147 , pp. 147-169
    • Mieghem, P.V.1
  • 23
    • 84885083917 scopus 로고    scopus 로고
    • A SIR e-epidemic model for computer worms based on cellular automata
    • Springer Berlin Heidelberg
    • Del Rey, A.M., (2013) A SIR e-Epidemic Model for Computer Worms Based on Cellular Automata, Advances in Artificial Intelligence, pp. 228-238, Springer Berlin Heidelberg.
    • (2013) Advances in Artificial Intelligence , pp. 228-238
    • Del Rey, A.M.1
  • 24
    • 83455249669 scopus 로고    scopus 로고
    • Stochastic modeling of worm propagation in trusted networks
    • Las Vegas, USA
    • Sehgal, V.K., (2006) Stochastic modeling of worm propagation in trusted networks, Security and Management Conference, pp. 482-488, Las Vegas, USA.
    • (2006) Security and Management Conference , pp. 482-488
    • Sehgal, V.K.1
  • 25
    • 70349898945 scopus 로고    scopus 로고
    • An SEIQR model for childhood diseases
    • Springer-Verlag
    • Gerberry, D.J. and Milner, F.A., (2009) An SEIQR model for childhood diseases, Journal of Mathematical Biology, 50(4), pp. 535-561, Springer-Verlag.
    • (2009) Journal of Mathematical Biology , vol.50 , Issue.4 , pp. 535-561
    • Gerberry, D.J.1    Milner, F.A.2
  • 26
    • 26844518826 scopus 로고    scopus 로고
    • Epidemiological models applied to viruses in computer networks
    • Piqueira, J.R.C., Navarro, B.F., and Monteiro, L.H., (2005) Epidemiological models applied to viruses in computer networks, Journal of Computer Science, 1(1), pp. 31-34.
    • (2005) Journal of Computer Science , vol.1 , Issue.1 , pp. 31-34
    • Piqueira, J.R.C.1    Navarro, B.F.2    Monteiro, L.H.3
  • 28
    • 85051117184 scopus 로고
    • Forecasting of influenza epidemics in USSR
    • Russian
    • Baroyan, O.V. and Rvachev, L.A., (1978) Forecasting of influenza epidemics in USSR, Medicine, 2, pp.131-137, (in Russian).
    • (1978) Medicine , vol.2 , pp. 131-137
    • Baroyan, O.V.1    Rvachev, L.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.