Browse > Article

Fighting Fast Worm Epidemics: Prevention, Detection, and Neutralization  

김효곤 (고려대학교)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 /
[ CAIDA ] / Analysis of the Sapphire Worm
2 Requirements for IPv4 routers /
[ F. Baker ] / RFC 1812
3 Demystifying the killer worm /
[ H. Kim ] / Techreport
4 The spread of the Sapphire/Slammer worm /
[ D. Moore;V. Paxson;S. Savage;C. Shannon;S. Staniford;N. Weaver ] / NANOG presentation
5 Internet Quarantine: Requirements for Containing Self-Propagating Code /
[ D. Moore;C. Shannon;G. Voelker;S. Savage ] / IEEE Infocom
6 How to Own the Internet in Your Spare Time /
[ Stuart Staniford;Vern Paxson;Nicholas Weaver ] / 11th USENIX Security Symposium
7 The Complexities of Viral VB Scripts /
[ S. Taylor ] / European Institute for Computer Antivirus Research (EICAR) International Conference
8 /
[] / VBS Worm Generator
9 Network Ingress Filtering:Defeating Denial of Service Attacks which employ IP Source Address Spoofing /
[ P. Ferguson;D. Senie ] / RFC 2827
10 /
[] / Newsbyte
11 Epidemic algorithms for replicated data management /
[ A. Demers(et al.) ] / Sixth Symp. on Principles of Distributed Computing(Vancouver)
12 /
[ CAIDA ] / CAIDA analysis of Code Red
13 /
[ IANA ] / Internet Protocol Version 4 Address Space
14 On the Effectiveness of Martian Address Filtering and its Extensions /
[ H. Kim;I. Kang ] / IEEE Globecom
15 Internet Expansion, Refinement, and Churn /
[ A. Broido;E.Nemeth;K. C. Claffy ] / NANOG presentation
16 /
[] / Red Hat Linux
17 /
[ K. Houle;J. Weaver ] / Trends in Denial of Service Attack Technology
18 Fast Classification, Calibration, and Visualization of DoS and Scan Attacks for Backbone Links /
[ H. Kim ] / Technical Report
19 Predators:good will mobile codes combat against computer viruses /
[ H. Toyoizumi;A. Kara ] / New Security Paradigms Workshop
20 /
[ D. HexXer ] / Code Green