참고문헌
- Anukool Lakhina, Mark Crovella, and Christophe Diot, 'Diagnosing Network-Wide Traffic Anomalies', SIGCOMM'04, Aug. 30-Sep.3, 2004. Portland, Oregon, USA
- A. Lakhina, M. Crovella, and C. Diot, 'Characterization of Network-Wide Anomalies in Traffic Flows', IMC '04, Taormina, Sicily, Italy, Oct. 2004
- Howard F. Lipson, Tracking and Tracing Cyber-Attacks: Technical Challenges and Global Policy Issues. Technical report, CERT Coordination Center, Nov. 2002
- Simon Hansman, A Taxonomy of Network and Computer Attack Methodologies, University of Canterbury, New Zealand, Nov. 2003
- V. Yegneswaran, P. Barford, and J. Ullrich, 'Internet Intrusions: Global Characteristics and Prevalence', In ACM SIGMETRICS, San Diego, June 2003
- A. Markopoulou, G. Iannaccone, S. Bhattacharyya, C.-N. Chuah, and C. Diot, 'Characterization of Failures in an IP Backbone', In IEEE INFOCOM, Hong Kong, April 2004
- N. Weaver. Warhol Worms: The Potential for Very Fast Internet Plagues, http://www.cs.berkeley.edu/~nweaver/warhol. htmI
- A. Hussain, J. Heidemann, and C. Papadopoulos, 'A Framework for Classifying Denial of Service Attacks', In ACM SIGCOMM, Karlsruhe, Aug. 2003
- J. Mirkovie and P. Reiher, 'A Taxonomy of DDoS Attacks and Defense Mechanisms', ACM CCR, April 2004
- P. Barford, J. Kline, D. Plonka, and A. Ron, 'A Signal Analysis of Network Traffic Anomalies', In Internet Measurement Workshop, Marseille, Nov. 2002
- N. Duffield, C. Lund, and M. Thorup, 'Estimating Flow Distributions from Sampled Flow Statistics', In ACM SIGCOMM, Karlsruhe, Aug. 2003
- J. Jung, B. Krishnamurthy and M. Rabinovich, Flash Crowds and Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites. In World Wide Web Conference, Hawaii, May 2002
- Glenn Gebhart, Worm Propagation and Countermeasures, SANS Institute, 2004
- Internet Security Systems, ISS Security Advisory: 'Snork' Denial of Service Attack Against Windows NT RPC Service. 1998. http://xforce.iss.net/xforce/alerts/id/advise9
- Ed Skoudis and Lenny Zeltser, Malware: Fighting Malicious Code, Prentice-Hall, 2004, (Chapter 2: Virus, 3: Worm)
- Xuan Chen and John Heidemann, Detecting Early Worm Propagation through Packet Matching, Technical Report ISI-TR-2004-585, 2004
- Jing Yang, 'Fast Worm Propagation in IPv6 Networks'