Browse > Article

정보통신 인프라의 웜 전파 분석 및 모델링  

Jeon, Yong-Hui (대구가톨릭대학교 컴퓨터정보통신공학부)
Publication Information
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 J. O. Kephart, D. M. Chess and S. R. White, 'Computers and Epidemiology', IEEE Spectrum, 1993
2 Amo Wagner, Thomas Dubendorfer, 'Experiences with Worm Propagation Simulations', WORM'03, pp.34-41, Oct. 2003, Washington DC. USA
3 SSF.App.Worm, A NetworkModeling Package for SSFNet. http://www.cs.dartmouth.edu/mili/research/ssf/worm/index.html
4 N. Weaver. Warhol Worms: The Potential for Very Fast Internet Plagues, http://www.s.berkeley.edu/$^~$nweaver/warhol.html
5 Simulating Network Worms, NWS by Bruce Ediger, http://www.users. qwest.net/eballenl/nws/
6 D. Moore, The Spread of the Code-Red Worm, http://www.caida.org/analysis/secunty/code-red/coderedv2_analysis.xml
7 J. C. Frauenthal, Mathematical Modeling in Epidemiology, Springer Verlag, New York, 1980
8 J. O. Kephart and S. R. White, 'Measuring and Modeling Computer Virus Prevalence', Proc. of the IEEE Symposium on Security and Privacy, 1993
9 Carl Endorf, Eugune Schultz, Jim Mellander, Intrusion Detection and Prevention, McGraw-Hill, 2004
10 S. Staniford, V. Paxon and N. Weaver, 'How to Own the Internet in Your Spare Time', 11th Usenix Security Symposium, San Francisco, August, 2002
11 Cliff Changchun Zou, Lixin Gao, Weibo Gong, Don Towsley, 'Monitoring and Early Warning for Internet Worms', 10th ACM Conference on Computer and Communication Security (CCS'03), Washington, DC, USA, Oct. 2003
12 Cliff Changchun Zou, Don Towsley, Weibo Gong, On the Performance of Internet Worm Scanning Strategies, Tech. Report: TR-03-CSE-07, Department of Computer Science, Univ. of Massachusetts, Amherst, USA
13 Thomas M. Chen, Jean-Marc Robert, 'Worm Epidemics in High-Speed Networks', IEEE Computer, pp48-53, June 2004
14 J. O. Kephart and S. R. White, 'Directed-graph Epidemiological Models of Computer Viruses', Proc. of the IEEE Symposium on Security and Privacy, pp343-359, 1991
15 C. C. Zou, D. Towsley, W. Gong, and S. Cai, Routing Worm: a Fast, Selective Attack Worm based on IP Address Information, Univ. of Massachusetts Tech. Report TR-CSE-03-06, Nov. 2003
16 Ram Dantu, Joao Cangussu, Arun Yelimeli, 'Dynamic Control of Worm Propagation', International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 1, Apiil 05 - 07, 2004, Las Vegas, Nevada
17 David Moore et al., 'Inside the Slammer Worm', IEEE Security & Privacy, pp33-39, 2003
18 Cliff Changchun Zou, Weibo Gong, Don Towsley, 'Code Red Worm Propagation Modeling and Analysis', 9th ACM Conference on Computer and Communication Secunty(CCS'02), Washington, DC, USA, Nov. 2002
19 T. Heberlin, Visual simulation of Code Red worm propagation patterns. http://www.incidents.org/archives/intrusions/msgO0659.html
20 Mark Shaneck, Worms: Taxonomy and Detection, ppt document, Feb. 6, 2004