-
1
-
-
0003545819
-
The Internet worm program: An analysis
-
Technical Report, CSD-TR-823, West Lafayette: Department of Computer Science, Purdue University
-
Spaffrd EH. The Internet worm program: An analysis. Technical Report, CSD-TR-823, West Lafayette: Department of Computer Science, Purdue University, 1988. 1-29.
-
(1988)
, pp. 1-29
-
-
Spaffrd, E.H.1
-
2
-
-
8644227174
-
Code Red worm
-
EEye Digital Security
-
EEye Digital Security. Code Red worm. 2001. http://www.eeye.com/html/research/advisories/al20010717.html
-
(2001)
-
-
-
3
-
-
3042639814
-
Code red II: Another worm exploiting buffer overflow in US indexing service DLL
-
CERT
-
CERT. Code Red II: Another worm exploiting buffer overflow in US indexing service DLL. 2001. http://www.cert.org/incident_notes/in-2001-09.html
-
(2001)
-
-
-
4
-
-
8644268365
-
Potential strategies for high speed active worms
-
Weaver N. Potential strategies for high speed active worms. 2002. http://www.cs.berkeley.edu/-nweaver/worms.pdf
-
(2002)
-
-
Weaver, N.1
-
5
-
-
85084162258
-
How to own the Internet in your spare time
-
Boneh D. (ed.), San Francisco
-
Staniford S, Paxson V, Weaver N. How to own the Internet in your spare time. In: Boneh D, ed. Proc. of the 11th Usenix Security Symp. San Francisco, 2002. http://www.icir.org/vern/papers/cdc-usenix-sec02/cdc.pdf
-
(2002)
Proc. of the 11th Usenix Security Symp.
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
-
6
-
-
0038289949
-
Warhol worms: The potential for very fast Internet plagues
-
Weaver N. Warhol worms: The potential for very fast Internet plagues. 2002. http://www.es.berkeley.edul-nweaver/warhol.html
-
(2002)
-
-
Weaver, N.1
-
7
-
-
84943680959
-
Computers and epidemiology
-
Chinese source
-
Kephart JO, Chess DM, White SR. Computers and epidemiology. IEEE Spectrum, 1993, 30(5): 20-26.
-
(1993)
IEEE Spectrum
, vol.30
, Issue.5
, pp. 20-26
-
-
Kephart, J.O.1
Chess, D.M.2
White, S.R.3
-
10
-
-
8644224393
-
Open problems in computer virus research
-
Steve W. Open problems in computer virus research. 1998. http://www.research.ibm.com/antivirus/SciPapers/White/Problems/ Problems.html
-
(1998)
-
-
Steve, W.1
-
11
-
-
8644273520
-
An environment for controlled worm replication and analysis
-
Oxfordshire
-
Arnold B, Chess D, Morar J, Segal A, Swimmer M. An environment for controlled worm replication and analysis. Virus Bulletin, Oxfordshire, 2000. 1-20.
-
(2000)
Virus Bulletin
, pp. 1-20
-
-
Arnold, B.1
Chess, D.2
Morar, J.3
Segal, A.4
Swimmer, M.5
-
12
-
-
0041534274
-
A snapshot of global internet worm activity
-
Technical Report, Arbor Networks
-
Song D, Malan R, Stone R. A snapshot of global Internet worm activity. Technical Report, Arbor Networks, 2001. http://www.flrst.org/events/progconf/2002/d5-02-song-slides.pdf
-
(2001)
-
-
Song, D.1
Malan, R.2
Stone, R.3
-
13
-
-
0042474173
-
Internet quarantine: Requirements for containing self-propagating code
-
Bauer F. (ed.), San Francisco
-
Moore D, Shannon C, Voelker G, Savage S. Internet quarantine: requirements for containing self-propagating code. In: Bauer F, ed. Proc. of the 2003 IEEE Infocom Conf. San Francisco, 2003. http://www-cse.ucsd.edu/users/savage/papers/Infocom03.pdf
-
(2003)
Proc. of the 2003 IEEE Infocom Conf.
-
-
Moore, D.1
Shannon, C.2
Voelker, G.3
Savage, S.4
-
14
-
-
19944407732
-
NSF awards $5.46 million to UC Berkeley and USC to build test bed for cyber war games
-
http://www.berkeley.edu/news/media/releases/2003/10/15_testbed.shtml
-
Yang S, Relations M. NSF awards $5.46 million to UC Berkeley and USC to build test bed for cyber war games. 2003. http://www.berkeley.edu/news/media/releases/2003/10/15_testbed.shtml
-
(2003)
-
-
Yang, S.1
Relations, M.2
-
15
-
-
8644224392
-
Internet worm research
-
Ph.D. thesis, Tianjin: College of Information Technologies Science, Nankai University, Chinese source
-
Zheng H. Internet worm research [Ph.D. Thesis]. Tianjin: College of Information Technologies Science, Nankai University, 2003. 12-15 (in Chinese with English abstract).
-
(2003)
, pp. 12-15
-
-
Zheng, H.1
-
16
-
-
0036119199
-
Analysis on Lion worm and some discussing about it
-
Chinese source
-
Zuo XD, Dai YX. Analysis on Lion worm and some discussing about it. Computer Engineering, 2002, 28(1): 16-17 (in Chinese with English abstract).
-
(2002)
Computer Engineering
, vol.28
, Issue.1
, pp. 16-17
-
-
Zuo, X.D.1
Dai, Y.X.2
-
17
-
-
8644228791
-
Adore worm
-
http://www.sans.org/y2k/adore.htm
-
Fearnow M, Stearns W. Adore worm. 2001. http://www.sans.org/y2k/adore.htm
-
(2001)
-
-
Fearnow, M.1
Stearns, W.2
-
19
-
-
8644227173
-
CCERT advisory on W32.Nachi.
-
CCERT, Chinese source
-
CCERT. CCERT advisory on W32.Nachi. Worm. 2003 (in Chinese). http://www.ccert.edu.cn/announce/show.php?handle=93
-
(2003)
Worm.
-
-
-
20
-
-
0023294949
-
Computer viruses: Theory and experiments
-
Cohen F. Computer viruses: Theory and experiments. Computers and Security, 1987, 6(1): 22-35.
-
(1987)
Computers and Security
, vol.6
, Issue.1
, pp. 22-35
-
-
Cohen, F.1
-
24
-
-
0042536297
-
CERT advisory CA-2001-26 nimda worm
-
Computer Emergency Response Team (CERT)
-
Computer Emergency Response Team (CERT). CERT advisory CA-2001-26 Nimda worm. 2001. http://www.cert.org/advisories/CA-2001-26.html
-
(2001)
-
-
-
25
-
-
8644220012
-
CERT/CC advisories
-
Computer Emergency Response Team (CERT)
-
Computer Emergency Response Team (CERT). CERT/CC advisories. 2004. http://www.cert.org/advisories/
-
(2004)
-
-
-
26
-
-
8644229619
-
The art of port scanning
-
Fyodor. The art of port scanning. Phrack Magazine, 1997, 7(51): 11-17.
-
(1997)
Phrack Magazine
, vol.7
, Issue.51
, pp. 11-17
-
-
Fyodor1
-
27
-
-
8644260326
-
Bogon list v2.4
-
Thomas R. Bogon list v2.4. 2002. http://www.cymru.com/Documents/bogon-list.html
-
(2002)
-
-
Thomas, R.1
-
28
-
-
8644242022
-
-
F-Secure Secure Information Center, Global Slapper Worm Information Center
-
F-Secure Secure Information Center. Global Slapper Worm Information Center. 2002. http://www.f-secure.com/slapper/
-
(2002)
-
-
-
29
-
-
0742276097
-
Inside the slammer worm
-
Moore D, Paxson V, Savage S, Shannon C, Staniford S, Weaver N. Inside the slammer worm. IEEE Magazine of Security and Privacy, 2003, 1(4): 33-39.
-
(2003)
IEEE Magazine of Security and Privacy
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
30
-
-
8644275018
-
Blaster worm analysis
-
EEye Digital Security
-
EEye Digital Security. Blaster worm analysis. 2003. http://www.eeye.com/html/Research/Advisories/AL20030811.html
-
(2003)
-
-
-
31
-
-
8644220815
-
On the performance of Internet worm scanning strategies
-
Technical Report, TR-03-CSE-07, Electrical and Computer Engineering Department, University of Massachusetts
-
Zou CC, Gong W, Towsley D. On the performance of Internet worm scanning strategies. Technical Report, TR-03-CSE-07, Electrical and Computer Engineering Department, University of Massachusetts, 2003.
-
(2003)
-
-
Zou, C.C.1
Gong, W.2
Towsley, D.3
-
32
-
-
8644236108
-
Routing worm: A fast, selective attack worm based on IP address information
-
Technical Report, TR-03-CSE-06, Electrical and Computer Engineering Department, University of Massachusetts
-
Zou CC, Towsley D, Gong W, Cai S. Routing worm: A fast, selective attack worm based on IP address information. Technical Report, TR-03-CSE-06, Electrical and Computer Engineering Department, University of Massachusetts, 2003.
-
(2003)
-
-
Zou, C.C.1
Towsley, D.2
Gong, W.3
Cai, S.4
-
33
-
-
8644257039
-
IPv4 BGP geopolitical analysis
-
CAIDA
-
CAIDA. IPv4 BGP geopolitical analysis. 2001. http://www.caida.org/analysis/geopolitical/bgp2country/
-
(2001)
-
-
-
34
-
-
0141762461
-
Code red: A case study on the spread and victims of an internet worm
-
Ammar M. (ed.), Marseille
-
Moore D, Shannon C, Claffy K. Code Red: A case study on the spread and victims of an Internet worm. In: Ammar M, ed. Proc. of the Internet Measurement Workshop. Marseille, 2002. 273-284.
-
(2002)
Proc. of the Internet Measurement Workshop
, pp. 273-284
-
-
Moore, D.1
Shannon, C.2
Claffy, K.3
-
36
-
-
8644280743
-
Simulating and optimizing worm propagation algorithms
-
Vogt T. Simulating and optimizing worm propagation algorithms. 2003. http://web.lemuria.org/security/WormPropagation.pdf
-
(2003)
-
-
Vogt, T.1
-
41
-
-
0004204717
-
The design of GrIDS: A graph-based intrusion detection system
-
Technical Report, CSE-99-2, Computer Science Department, U.C. Davis
-
Cheung S, Hoagland J, Levitt K, Rowe J, Staniford C, Yip R, Zerkle D. The design of GrIDS: A graph-based intrusion detection system. Technical Report, CSE-99-2, Computer Science Department, U.C. Davis, 1999. http://citeseer.nj.nec.com/cheung99design.html
-
(1999)
-
-
Cheung, S.1
Hoagland, J.2
Levitt, K.3
Rowe, J.4
Staniford, C.5
Yip, R.6
Zerkle, D.7
-
42
-
-
8644272734
-
Internet worm and virus protection in dynamically reconfigurable hardware
-
Washington: Military and Aerospace Programmable Logic Device (MAPLD)
-
Lockwood JW, Moscola J, Kulig M, Reddick D, Brooks T. Internet worm and virus protection in dynamically reconfigurable hardware. In: Proc. of the ACM CCS Workshop on Rapid Malcode (WORM 2003). Washington: Military and Aerospace Programmable Logic Device (MAPLD), 2003.
-
(2003)
Proc. of the ACM CCS Workshop on Rapid Malcode (WORM 2003)
-
-
Lockwood, J.W.1
Moscola, J.2
Kulig, M.3
Reddick, D.4
Brooks, T.5
-
44
-
-
8644291849
-
Honeypot technology
-
Morrison. Honeypot technology. 2001. http://www.xfocus.net/articles/200103/121.html
-
(2001)
-
-
Morrison1
-
45
-
-
11844249640
-
ReVirt: Enabling intrusion analysis through virtual-machine logging and replay
-
Boston
-
George WD, Samuel TK, Sukru C, Murtaza B, Peter MC. ReVirt: Enabling intrusion analysis through virtual-machine logging and replay. In: Proc. of the 2002 Symp. on Operating Systems Design and Implementation. Boston, 2002.
-
(2002)
Proc. of the 2002 Symp. on Operating Systems Design and Implementation
-
-
George, W.D.1
Samuel, T.K.2
Sukru, C.3
Murtaza, B.4
Peter, M.C.5
-
47
-
-
8644246187
-
A virtual honeypot framework
-
Technical Report, 03-1. Center of Information Technology Integration, University of Michigan
-
Proves N. A virtual honeypot framework. Technical Report, 03-1. Center of Information Technology Integration, University of Michigan, 2003. http://www.citi.umich.edu/techreports/reports/citi-tr-03-1.pdf
-
(2003)
-
-
Proves, N.1
-
48
-
-
34147212851
-
Fighting worms with honeypots
-
Oudot L. Fighting worms with honeypots: Honeyd vs Msblast.exe. 2003. http://lists.insecure.org/lists/honeypots/2003/ Jul-Sep/0071.html
-
(2003)
Honeyd vs Msblast.exe
-
-
Oudot, L.1
-
49
-
-
84976720856
-
The worm programs early experience with a distributed computation
-
Shoch, John F, Jon AH. The worm programs early experience with a distributed computation. Communications of the ACM, 1982, 25(3): 172-180.
-
(1982)
Communications of the ACM
, vol.25
, Issue.3
, pp. 172-180
-
-
Shoch1
John, F.2
Jon, A.H.3
-
50
-
-
8644258690
-
-
CERT/CC. CERT® Incident Note IN-2001-05
-
CERT/CC. CERT® Incident Note IN-2001-05. 2001. http://www.cert.org/incident_notes/IN-2001-05.html
-
(2001)
-
-
-
52
-
-
8644270792
-
Monitoring and early warning for Internet worms
-
Technical Report, TR-CSE-03-01, Electrical and Computer Engineering Department, University of Massachusetts
-
Zou CC, Gao L, Gong W, Towsley D. Monitoring and early warning for Internet worms. Technical Report, TR-CSE-03-01, Electrical and Computer Engineering Department, University of Massachusetts, 2003.
-
(2003)
-
-
Zou, C.C.1
Gao, L.2
Gong, W.3
Towsley, D.4
-
53
-
-
0042536223
-
Welcome to my tarpit - The tactical and strategic use of LaBrea
-
Liston T. Welcome to my tarpit - The tactical and strategic use of LaBrea. 2001. http://www.labreatechnologies.com/ LaBrea_Tactics_And_Strategy.pdf.
-
(2001)
-
-
Liston, T.1
-
54
-
-
0003750241
-
An architecture for intrusion detection using autonomous agents
-
Technical Report, 98/05, Purdue University
-
Balasubramaniyan JS, Garcia-Fernandez JO, Isacoff D, Spafford E, Zamboni D. An architecture for intrusion detection using autonomous agents. Technical Report, 98/05, Purdue University, 1998.
-
(1998)
-
-
Balasubramaniyan, J.S.1
Garcia-Fernandez, J.O.2
Isacoff, D.3
Spafford, E.4
Zamboni, D.5
-
55
-
-
0002629036
-
Emerald: Event monitoring enabling responses to anomalous live disturbances
-
Baltimore: Baltimore Convention Center
-
Porras PA, Neumann PG. Emerald: Event monitoring enabling responses to anomalous live disturbances. In: Proc. of the 20th National Information Systems Security Conf. Baltimore: Baltimore Convention Center, 1997. 353-365.
-
(1997)
Proc. of the 20th National Information Systems Security Conf.
, pp. 353-365
-
-
Porras, P.A.1
Neumann, P.G.2
|