1 |
W32.Blaster.Worm, http://securityresponse.symantec.com/avcenter/venc/data/w32.blaster.worm.html
|
2 |
D. Moore, C. Shannon, and J.Brown, 'Code-Red: a case study on the spread and victims of an Internet worm,' in Proc. Second Internet Measurement Workshop, pp. 273-284, November, 2002
|
3 |
S. Noh, C. Lee, K. Ryu, K. Choi, and G. Jung, 'Detecting Worm Propagation Using Traffic Concentration Analysis and Inductive Learning,' Lecture Notes in Computer Science, 3177(1), pp. 402-408, 2004
|
4 |
H. Kim, I. Kang, and S. Bahk, 'Real-Time Visualization of Network Attacks on High-Speed Links,' IEEE Network, pp. 30-39, Sept/Oct 2004
|
5 |
B. Roh and S. Yoo, 'A Novel Detection Methodology of Network Attack Symptoms at Aggregate Traffic Level on Highspeed Internet Backbone Links,' Lecture Notes in Computer Science, 3124, pp. 1226-1235, August, 2004
|
6 |
C. Shannon and D. Moore, 'The Spread of the Witty Worm,' IEEE Security & Privacy, pp. 46-50, July/August 2004
|
7 |
C. Zou, W. Gong, D. Towsley, and L. Gao, 'The Monitoring and Early Detection of Internet Worms,' in Proc. 10th ACM conference on Computer and communication security, pp. 190-199, 2003
|
8 |
M. Kim, H. Kang, S. Hong, S. Chung, and W. Hong, 'A Flow-based Method for Abnormal Network Traffic Detection,' in Proc. IEEE/IFIP NOMS 2004, pp. 599-612, April 2004
|
9 |
김재현, 강신헌, '스캐닝 웜의 트래픽 특성을 이용한 탐지 방법,' in Proc. 제 18회 정보보호와 암호에 관한 학술대회, 천안, pp.71-82, 2006년 9월
|
10 |
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, 'Inside the Slammer Worm,' IEEE Security & Privacy, pp. 33-39, July/August 2003
|