정보통신 인프라의 웜 전파 분석 및 모델링

  • 전용희 (대구가톨릭대학교 컴퓨터정보통신공학부)
  • 발행 : 2004.09.01

초록

키워드

참고문헌

  1. Thomas M. Chen, Jean-Marc Robert, 'Worm Epidemics in High-Speed Networks', IEEE Computer, pp48-53, June 2004
  2. Ram Dantu, Joao Cangussu, Arun Yelimeli, 'Dynamic Control of Worm Propagation', International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 1, Apiil 05 - 07, 2004, Las Vegas, Nevada
  3. Carl Endorf, Eugune Schultz, Jim Mellander, Intrusion Detection and Prevention, McGraw-Hill, 2004
  4. J. C. Frauenthal, Mathematical Modeling in Epidemiology, Springer Verlag, New York, 1980
  5. T. Heberlin, Visual simulation of Code Red worm propagation patterns. http://www.incidents.org/archives/intrusions/msgO0659.html
  6. J. O. Kephart and S. R. White, 'Directed-graph Epidemiological Models of Computer Viruses', Proc. of the IEEE Symposium on Security and Privacy, pp343-359, 1991
  7. J. O. Kephart, D. M. Chess and S. R. White, 'Computers and Epidemiology', IEEE Spectrum, 1993
  8. J. O. Kephart and S. R. White, 'Measuring and Modeling Computer Virus Prevalence', Proc. of the IEEE Symposium on Security and Privacy, 1993
  9. D. Moore, The Spread of the Code-Red Worm, http://www.caida.org/analysis/secunty/code-red/coderedv2_analysis.xml
  10. David Moore et al., 'Inside the Slammer Worm', IEEE Security & Privacy, pp33-39, 2003
  11. Mark Shaneck, Worms: Taxonomy and Detection, ppt document, Feb. 6, 2004
  12. S. Staniford, V. Paxon and N. Weaver, 'How to Own the Internet in Your Spare Time', 11th Usenix Security Symposium, San Francisco, August, 2002
  13. Amo Wagner, Thomas Dubendorfer, 'Experiences with Worm Propagation Simulations', WORM'03, pp.34-41, Oct. 2003, Washington DC. USA
  14. N. Weaver. Warhol Worms: The Potential for Very Fast Internet Plagues, http://www.s.berkeley.edu/$^~$nweaver/warhol.html
  15. Cliff Changchun Zou, Weibo Gong, Don Towsley, 'Code Red Worm Propagation Modeling and Analysis', 9th ACM Conference on Computer and Communication Secunty(CCS'02), Washington, DC, USA, Nov. 2002
  16. C. C. Zou, D. Towsley, W. Gong, and S. Cai, Routing Worm: a Fast, Selective Attack Worm based on IP Address Information, Univ. of Massachusetts Tech. Report TR-CSE-03-06, Nov. 2003
  17. Cliff Changchun Zou, Don Towsley, Weibo Gong, On the Performance of Internet Worm Scanning Strategies, Tech. Report: TR-03-CSE-07, Department of Computer Science, Univ. of Massachusetts, Amherst, USA
  18. Cliff Changchun Zou, Lixin Gao, Weibo Gong, Don Towsley, 'Monitoring and Early Warning for Internet Worms', 10th ACM Conference on Computer and Communication Security (CCS'03), Washington, DC, USA, Oct. 2003
  19. Simulating Network Worms, NWS by Bruce Ediger, http://www.users. qwest.net/eballenl/nws/
  20. SSF.App.Worm, A NetworkModeling Package for SSFNet. http://www.cs.dartmouth.edu/mili/research/ssf/worm/index.html