메뉴 건너뛰기




Volumn 15, Issue 8, 2004, Pages 1208-1219

Research and development of internet worms

Author keywords

Function component; Internet worm; Network security; Propagation model; Scanning strategy

Indexed keywords

CODES (SYMBOLS); COMPUTER PROGRAM LISTINGS; MATHEMATICAL MODELS; SECURITY OF DATA;

EID: 8644261522     PISSN: 10009825     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (64)

References (55)
  • 1
    • 0003545819 scopus 로고
    • The Internet worm program: An analysis
    • Technical Report, CSD-TR-823, West Lafayette: Department of Computer Science, Purdue University
    • Spaffrd EH. The Internet worm program: An analysis. Technical Report, CSD-TR-823, West Lafayette: Department of Computer Science, Purdue University, 1988. 1-29.
    • (1988) , pp. 1-29
    • Spaffrd, E.H.1
  • 2
    • 8644227174 scopus 로고    scopus 로고
    • Code Red worm
    • EEye Digital Security
    • EEye Digital Security. Code Red worm. 2001. http://www.eeye.com/html/research/advisories/al20010717.html
    • (2001)
  • 3
    • 3042639814 scopus 로고    scopus 로고
    • Code red II: Another worm exploiting buffer overflow in US indexing service DLL
    • CERT
    • CERT. Code Red II: Another worm exploiting buffer overflow in US indexing service DLL. 2001. http://www.cert.org/incident_notes/in-2001-09.html
    • (2001)
  • 4
    • 8644268365 scopus 로고    scopus 로고
    • Potential strategies for high speed active worms
    • Weaver N. Potential strategies for high speed active worms. 2002. http://www.cs.berkeley.edu/-nweaver/worms.pdf
    • (2002)
    • Weaver, N.1
  • 5
    • 85084162258 scopus 로고    scopus 로고
    • How to own the Internet in your spare time
    • Boneh D. (ed.), San Francisco
    • Staniford S, Paxson V, Weaver N. How to own the Internet in your spare time. In: Boneh D, ed. Proc. of the 11th Usenix Security Symp. San Francisco, 2002. http://www.icir.org/vern/papers/cdc-usenix-sec02/cdc.pdf
    • (2002) Proc. of the 11th Usenix Security Symp.
    • Staniford, S.1    Paxson, V.2    Weaver, N.3
  • 6
    • 0038289949 scopus 로고    scopus 로고
    • Warhol worms: The potential for very fast Internet plagues
    • Weaver N. Warhol worms: The potential for very fast Internet plagues. 2002. http://www.es.berkeley.edul-nweaver/warhol.html
    • (2002)
    • Weaver, N.1
  • 10
    • 8644224393 scopus 로고    scopus 로고
    • Open problems in computer virus research
    • Steve W. Open problems in computer virus research. 1998. http://www.research.ibm.com/antivirus/SciPapers/White/Problems/ Problems.html
    • (1998)
    • Steve, W.1
  • 11
    • 8644273520 scopus 로고    scopus 로고
    • An environment for controlled worm replication and analysis
    • Oxfordshire
    • Arnold B, Chess D, Morar J, Segal A, Swimmer M. An environment for controlled worm replication and analysis. Virus Bulletin, Oxfordshire, 2000. 1-20.
    • (2000) Virus Bulletin , pp. 1-20
    • Arnold, B.1    Chess, D.2    Morar, J.3    Segal, A.4    Swimmer, M.5
  • 12
    • 0041534274 scopus 로고    scopus 로고
    • A snapshot of global internet worm activity
    • Technical Report, Arbor Networks
    • Song D, Malan R, Stone R. A snapshot of global Internet worm activity. Technical Report, Arbor Networks, 2001. http://www.flrst.org/events/progconf/2002/d5-02-song-slides.pdf
    • (2001)
    • Song, D.1    Malan, R.2    Stone, R.3
  • 13
    • 0042474173 scopus 로고    scopus 로고
    • Internet quarantine: Requirements for containing self-propagating code
    • Bauer F. (ed.), San Francisco
    • Moore D, Shannon C, Voelker G, Savage S. Internet quarantine: requirements for containing self-propagating code. In: Bauer F, ed. Proc. of the 2003 IEEE Infocom Conf. San Francisco, 2003. http://www-cse.ucsd.edu/users/savage/papers/Infocom03.pdf
    • (2003) Proc. of the 2003 IEEE Infocom Conf.
    • Moore, D.1    Shannon, C.2    Voelker, G.3    Savage, S.4
  • 14
    • 19944407732 scopus 로고    scopus 로고
    • NSF awards $5.46 million to UC Berkeley and USC to build test bed for cyber war games
    • http://www.berkeley.edu/news/media/releases/2003/10/15_testbed.shtml
    • Yang S, Relations M. NSF awards $5.46 million to UC Berkeley and USC to build test bed for cyber war games. 2003. http://www.berkeley.edu/news/media/releases/2003/10/15_testbed.shtml
    • (2003)
    • Yang, S.1    Relations, M.2
  • 15
    • 8644224392 scopus 로고    scopus 로고
    • Internet worm research
    • Ph.D. thesis, Tianjin: College of Information Technologies Science, Nankai University, Chinese source
    • Zheng H. Internet worm research [Ph.D. Thesis]. Tianjin: College of Information Technologies Science, Nankai University, 2003. 12-15 (in Chinese with English abstract).
    • (2003) , pp. 12-15
    • Zheng, H.1
  • 16
    • 0036119199 scopus 로고    scopus 로고
    • Analysis on Lion worm and some discussing about it
    • Chinese source
    • Zuo XD, Dai YX. Analysis on Lion worm and some discussing about it. Computer Engineering, 2002, 28(1): 16-17 (in Chinese with English abstract).
    • (2002) Computer Engineering , vol.28 , Issue.1 , pp. 16-17
    • Zuo, X.D.1    Dai, Y.X.2
  • 17
    • 8644228791 scopus 로고    scopus 로고
    • Adore worm
    • http://www.sans.org/y2k/adore.htm
    • Fearnow M, Stearns W. Adore worm. 2001. http://www.sans.org/y2k/adore.htm
    • (2001)
    • Fearnow, M.1    Stearns, W.2
  • 18
    • 0042035474 scopus 로고    scopus 로고
    • Nimda worm analysis
    • Mackie A, Roculan J, Russell R, Velzen MV. Nimda worm analysis. 2001. http://aris.securityfocus.com/alerts/nimda/ 010919-Analysis-Nimda.pdf
    • (2001)
    • Mackie, A.1    Roculan, J.2    Russell, R.3    Velzen, M.V.4
  • 19
    • 8644227173 scopus 로고    scopus 로고
    • CCERT advisory on W32.Nachi.
    • CCERT, Chinese source
    • CCERT. CCERT advisory on W32.Nachi. Worm. 2003 (in Chinese). http://www.ccert.edu.cn/announce/show.php?handle=93
    • (2003) Worm.
  • 20
    • 0023294949 scopus 로고
    • Computer viruses: Theory and experiments
    • Cohen F. Computer viruses: Theory and experiments. Computers and Security, 1987, 6(1): 22-35.
    • (1987) Computers and Security , vol.6 , Issue.1 , pp. 22-35
    • Cohen, F.1
  • 24
    • 0042536297 scopus 로고    scopus 로고
    • CERT advisory CA-2001-26 nimda worm
    • Computer Emergency Response Team (CERT)
    • Computer Emergency Response Team (CERT). CERT advisory CA-2001-26 Nimda worm. 2001. http://www.cert.org/advisories/CA-2001-26.html
    • (2001)
  • 25
    • 8644220012 scopus 로고    scopus 로고
    • CERT/CC advisories
    • Computer Emergency Response Team (CERT)
    • Computer Emergency Response Team (CERT). CERT/CC advisories. 2004. http://www.cert.org/advisories/
    • (2004)
  • 26
    • 8644229619 scopus 로고    scopus 로고
    • The art of port scanning
    • Fyodor. The art of port scanning. Phrack Magazine, 1997, 7(51): 11-17.
    • (1997) Phrack Magazine , vol.7 , Issue.51 , pp. 11-17
    • Fyodor1
  • 27
    • 8644260326 scopus 로고    scopus 로고
    • Bogon list v2.4
    • Thomas R. Bogon list v2.4. 2002. http://www.cymru.com/Documents/bogon-list.html
    • (2002)
    • Thomas, R.1
  • 28
    • 8644242022 scopus 로고    scopus 로고
    • F-Secure Secure Information Center, Global Slapper Worm Information Center
    • F-Secure Secure Information Center. Global Slapper Worm Information Center. 2002. http://www.f-secure.com/slapper/
    • (2002)
  • 30
    • 8644275018 scopus 로고    scopus 로고
    • Blaster worm analysis
    • EEye Digital Security
    • EEye Digital Security. Blaster worm analysis. 2003. http://www.eeye.com/html/Research/Advisories/AL20030811.html
    • (2003)
  • 31
    • 8644220815 scopus 로고    scopus 로고
    • On the performance of Internet worm scanning strategies
    • Technical Report, TR-03-CSE-07, Electrical and Computer Engineering Department, University of Massachusetts
    • Zou CC, Gong W, Towsley D. On the performance of Internet worm scanning strategies. Technical Report, TR-03-CSE-07, Electrical and Computer Engineering Department, University of Massachusetts, 2003.
    • (2003)
    • Zou, C.C.1    Gong, W.2    Towsley, D.3
  • 32
    • 8644236108 scopus 로고    scopus 로고
    • Routing worm: A fast, selective attack worm based on IP address information
    • Technical Report, TR-03-CSE-06, Electrical and Computer Engineering Department, University of Massachusetts
    • Zou CC, Towsley D, Gong W, Cai S. Routing worm: A fast, selective attack worm based on IP address information. Technical Report, TR-03-CSE-06, Electrical and Computer Engineering Department, University of Massachusetts, 2003.
    • (2003)
    • Zou, C.C.1    Towsley, D.2    Gong, W.3    Cai, S.4
  • 33
    • 8644257039 scopus 로고    scopus 로고
    • IPv4 BGP geopolitical analysis
    • CAIDA
    • CAIDA. IPv4 BGP geopolitical analysis. 2001. http://www.caida.org/analysis/geopolitical/bgp2country/
    • (2001)
  • 34
    • 0141762461 scopus 로고    scopus 로고
    • Code red: A case study on the spread and victims of an internet worm
    • Ammar M. (ed.), Marseille
    • Moore D, Shannon C, Claffy K. Code Red: A case study on the spread and victims of an Internet worm. In: Ammar M, ed. Proc. of the Internet Measurement Workshop. Marseille, 2002. 273-284.
    • (2002) Proc. of the Internet Measurement Workshop , pp. 273-284
    • Moore, D.1    Shannon, C.2    Claffy, K.3
  • 36
    • 8644280743 scopus 로고    scopus 로고
    • Simulating and optimizing worm propagation algorithms
    • Vogt T. Simulating and optimizing worm propagation algorithms. 2003. http://web.lemuria.org/security/WormPropagation.pdf
    • (2003)
    • Vogt, T.1
  • 41
    • 0004204717 scopus 로고    scopus 로고
    • The design of GrIDS: A graph-based intrusion detection system
    • Technical Report, CSE-99-2, Computer Science Department, U.C. Davis
    • Cheung S, Hoagland J, Levitt K, Rowe J, Staniford C, Yip R, Zerkle D. The design of GrIDS: A graph-based intrusion detection system. Technical Report, CSE-99-2, Computer Science Department, U.C. Davis, 1999. http://citeseer.nj.nec.com/cheung99design.html
    • (1999)
    • Cheung, S.1    Hoagland, J.2    Levitt, K.3    Rowe, J.4    Staniford, C.5    Yip, R.6    Zerkle, D.7
  • 44
    • 8644291849 scopus 로고    scopus 로고
    • Honeypot technology
    • Morrison. Honeypot technology. 2001. http://www.xfocus.net/articles/200103/121.html
    • (2001)
    • Morrison1
  • 47
    • 8644246187 scopus 로고    scopus 로고
    • A virtual honeypot framework
    • Technical Report, 03-1. Center of Information Technology Integration, University of Michigan
    • Proves N. A virtual honeypot framework. Technical Report, 03-1. Center of Information Technology Integration, University of Michigan, 2003. http://www.citi.umich.edu/techreports/reports/citi-tr-03-1.pdf
    • (2003)
    • Proves, N.1
  • 48
    • 34147212851 scopus 로고    scopus 로고
    • Fighting worms with honeypots
    • Oudot L. Fighting worms with honeypots: Honeyd vs Msblast.exe. 2003. http://lists.insecure.org/lists/honeypots/2003/ Jul-Sep/0071.html
    • (2003) Honeyd vs Msblast.exe
    • Oudot, L.1
  • 49
    • 84976720856 scopus 로고
    • The worm programs early experience with a distributed computation
    • Shoch, John F, Jon AH. The worm programs early experience with a distributed computation. Communications of the ACM, 1982, 25(3): 172-180.
    • (1982) Communications of the ACM , vol.25 , Issue.3 , pp. 172-180
    • Shoch1    John, F.2    Jon, A.H.3
  • 50
    • 8644258690 scopus 로고    scopus 로고
    • CERT/CC. CERT® Incident Note IN-2001-05
    • CERT/CC. CERT® Incident Note IN-2001-05. 2001. http://www.cert.org/incident_notes/IN-2001-05.html
    • (2001)
  • 52
    • 8644270792 scopus 로고    scopus 로고
    • Monitoring and early warning for Internet worms
    • Technical Report, TR-CSE-03-01, Electrical and Computer Engineering Department, University of Massachusetts
    • Zou CC, Gao L, Gong W, Towsley D. Monitoring and early warning for Internet worms. Technical Report, TR-CSE-03-01, Electrical and Computer Engineering Department, University of Massachusetts, 2003.
    • (2003)
    • Zou, C.C.1    Gao, L.2    Gong, W.3    Towsley, D.4
  • 53
    • 0042536223 scopus 로고    scopus 로고
    • Welcome to my tarpit - The tactical and strategic use of LaBrea
    • Liston T. Welcome to my tarpit - The tactical and strategic use of LaBrea. 2001. http://www.labreatechnologies.com/ LaBrea_Tactics_And_Strategy.pdf.
    • (2001)
    • Liston, T.1
  • 54
    • 0003750241 scopus 로고    scopus 로고
    • An architecture for intrusion detection using autonomous agents
    • Technical Report, 98/05, Purdue University
    • Balasubramaniyan JS, Garcia-Fernandez JO, Isacoff D, Spafford E, Zamboni D. An architecture for intrusion detection using autonomous agents. Technical Report, 98/05, Purdue University, 1998.
    • (1998)
    • Balasubramaniyan, J.S.1    Garcia-Fernandez, J.O.2    Isacoff, D.3    Spafford, E.4    Zamboni, D.5
  • 55
    • 0002629036 scopus 로고    scopus 로고
    • Emerald: Event monitoring enabling responses to anomalous live disturbances
    • Baltimore: Baltimore Convention Center
    • Porras PA, Neumann PG. Emerald: Event monitoring enabling responses to anomalous live disturbances. In: Proc. of the 20th National Information Systems Security Conf. Baltimore: Baltimore Convention Center, 1997. 353-365.
    • (1997) Proc. of the 20th National Information Systems Security Conf. , pp. 353-365
    • Porras, P.A.1    Neumann, P.G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.