참고문헌
- http://www.trendmicro.com/kr/products/network/viruswall1200/evaluate/cases/kookminilbo.htm
- Cliff Changchun Zou, Weibo Gong, Don Towsley, 'Worm Propagation Modeling and Analysis under Dynamic Quarantine Defense', Univ. Massachusetts Amherst, MA1
- Yong Huang, 'Code-Red: a case study on the spread and victims of an Internet worm' 15-20, David Moore, Colleen Shannon, K Claffy CAIDA, San Diego Supercomputer Center, UCSD IMW 2002 Presented by: Yong Huang
- Hyundo Park, Heejo Lee, 'Detection Unknown Worms Using Randomness Check', KOREA University
- Zesheng Chen, Chuanyi Ji, 'Optimal wormscanning method using vulnerable-host distributions'
- S. Staniford, V. Paxson, N. Weaver, 'How to Own the Internet in your spare time,' in Proc. of the 11th USENIX Security Symposium (Secu- rity'02), San Francisco, CA, Aug. 2002
- N.Weaver, WarholWorms, 'The Potential for Very Fast Internet Plagues', http://www.cs.berkeley.edu/-nweaver/warhol.html., august 15th, 2001
- Stuart Staniford, Vern Paxson, Nicholas Weaver, David Moore, 'The Top Speed of Flash Worms', Workshop on Rapid Malcode, 2004
- http://www.caida.org/analysis/security/code-red/#crii
- http://www.caida.org/publications/papers/2003/sapphire/sapphire.html
- F.B Cohen, 'A Formal Definition of Computer Worms and Some Related Results', Computers & Security, 7(11) (1992), pp. 641-652, ISSN 0167-4048, 1992
- Dr. Winfried Gleissner, 'A Mathematical Theory for the Spread of Computer Viruses', Computers & Security, 8, 1989, pp. 35-41, ISSN 0167-4048, February 1989 https://doi.org/10.1016/0167-4048(89)90037-0
- Cliff Changchun Zou, Weibo Gong, Don Towsley 'Code Red Worm Propagation Modeling and Analysis', Conference on Computer and Communications Security, 2002
- Zesheng Chen, Lixin Gao, Kevin Kwiat, 'Modeling the Spread of Active Worms' pp. 1-11, ieee
- Brian D. Carrier, Sundararaman Jeyaraman, Sarah Sellke, 'IMPACT OF NETWORK DESIGN ON WORM PROPAGATION', Center for Education and Research in Information Assurance and Security, Purdue University, West Lafayette, IN 47907-2086
- http://www.caida.org/analysis/security/code-red/#crii
- R. Russell and A. Machie, 'Code Red II Worm,' Tech. Rep., Incident Analysis, SecurityFocus, Aug. 2001
- A. Machie, J. Roculan, R. Russell, and M. V. Velzen, 'Nimda Worm Analysis,' Tech. Rep., Incident Analysis, SecurityFocus, Sept. 2001
- CERT/CC, 'CERT Advisory CA-2001-26 Nimda Worm,' http://www.cert.org/advisories/CA-2001-26.html, Sept. 2001
- D. Song, R. Malan, and R. Stone, 'A Snapshot of Global Internet Worm Activity,' Tech. Rep., Arbor Networks, Nov. 2001
- J. O. Kephart and S. R. White, 'Directedgraph Epidemiological Models of Computer Viruses,' in Proc. of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy, May 1991, pp. 343-359