Browse > Article

웜 공격의 특성 분석 및 확산 방지 기술  

전용희 (대구가톨릭대학교 공과대학 컴퓨터정보통신공학부)
Keywords
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 전용희, 손승원, '정보통신 인프라 보호를 위한 미국의 연구개발 동향', 한국통신학회지 제 21권 제9호, pp. 1033-1047, 2004년 9월
2 전용희, '인터넷 웜의 탐지 및 대응기술', 한국통신학회지 제22권 제8호, pp. 1088-1103, 2005년 8월
3 Z. Chen, L. Gao, and K. Kwiat, 'Modeling the Spread of Active Worms', INFOCOM, pp.1890-1900, April 2003, California
4 Gregory R. Ganger, Gregg Economou, and Stanley M. Bielski. Self-Securing Network Interfaces: What, Why and How. Technical Report
5 Stuart E. Schechter, Jaeyoun Jung, and Arthur W. Berger, 'Fast Detection of Scanning Worm Infections'. Proc. of 7th International Symposium on Recent Advances in Intrusion Detection (RAID), Sep. 2004, France
6 전용희, 장종수, 손승원, '미국의 정보인프라 보호 연구개발 동향 분석', 전자통신동향분석, 제19권 제4호, pp. 96-108, 한국전자통신연구원, 2004년 8월
7 Matthew M. Williamson, 'Throttling Viruses: Restricting propagation to defeat malicious code', Proc. of ACSAC Security Conference. pp.61-68. 2002
8 Helen J. Wang et al., 'Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits', Proc. of ACM SIGCOMM '04, Aug. 30-Sep. 3, 2004, USA
9 Cynthia Wong, Chenxi Wang, Dawn Song, Stanley M. Bielski, and Gregory R. Ganger, 'Dynamic Quarantine of Internet Worms', The International Conf. on Dependable Systems and Networks (DSN-2004) pp.62-71. 2004
10 Cliff C. Zou, Weibo Gong, Don Towsley, 'Worm Propagation Modeling and Analysis under Dynamic Quarantine Defense'. ACM WORM '03, Washington DC, USA, Oct.2003
11 David J. Albanese et al., The Case for Using Layered Defenses to Stop Worms, Report #C43-002R-2004, Ver. 1.0, June 18, 2004, National Security Agency, USA
12 Hyang-Ah Kim and Brad Karp, 'Autograph: Toward Automated Distributed Worm Signature Detection', Proc. of Usenix Security Sym., pp.271-286, 2004
13 S. Staniford, V. Paxon and N. Weaver, 'How to Own the Internet Spare Time', 11th Usenix Security Symposium, San Francisco, August 2002
14 Min Cai et al., 'Collaborative Internet Worm Containment', IEEE Security and Privacy, pp.24-33, May/June 2005
15 Cliff C. Zou et al., 'Monitoring and Early Warning for Internet Worms'. Proc. of 10th ACM Conf. Computer and Comm. Security(CCS 03). pp. 190-199, Oct. 2003
16 신승원, 오진태, 김기영, 장종수, ' 인터넷 웜 공격 탐지 방법 동향', 전자통신동향분석, 제 20권 제1호. pp. 9-16, 2005년 2월
17 Cynthis Wong, Stan Bielski, Ahren Studer, Chenxi Wang, On the Effectiveness of Rate Limiting Mechanisms, CMU-PDL-05-103. Carnegie Mellon University, March 2005
18 Sumeet Singh et al, 'Automated Worm Fingerprinting'. Proc. of Usenix Symp. Operating System Design and Implementation, pp.45-60. 2004
19 Ed Skoudis, Lenny Zeltser, Malware: Fighting Malicious Code, Prentice-Hall, 2004
20 J. Y. Jung, S. Schechter, and Arthur W. Berger, 'Fast Detection of Scanning Worm Infections', RAID 2004, Sophia Antipolis, France, Sep. 2004
21 D. Moore et al., 'Internet Quarantine Requirements for Containing Self-Propagating Codes', Proc. IEEE INFOCOM. pp 1901-1910, IEEE CS Press, 2003
22 Jose Nazario, Defense and Detection Strategies against Internet Worms, Artech House, 2004
23 Stelios Sidiroglou and Angelos D. Keromytis 'Countering Network Worms Through Automatic Patch Generation IEEE Security and Privacy, 2005
24 N. Weaver, S. Staniford, and V. Paxson, 'Very Fast Containment of Scanning Worms'. Proc. of 13th USENIX Security Symposium pp29-44. August 2004. California
25 Shigang Chen and Yong Tang, 'Slowing Down Internet Worms', Proc. of 24th IEEE International Conference on Distributed Computing Systems(ICDCS'04), Tokyo, Japan, March 2004