인터넷 웜의 탐지 및 대응기술

  • Published : 2005.08.25

Abstract

Keywords

References

  1. David J. Albanese, Michael J. Wiacek, Christopher M. Salter, and jeffrey A. Six, The Case for Using Layered Defenses to Stop Worms, Report #C43-002R-2004, Version 1.0, June 18, 2004, National Security Agency
  2. Thomas M. Chen, Jean-marc Robert, 'Worm Epidemics in High-Speed Networks', IEEE Computer, pp48-53, June 2004
  3. Xuan Chen and John Heidemann, Detecting Early Worm Propagation through Packet Matching, Technical Report ISI-TR-2004-585, 2004
  4. Z. Chen, L, Gao and K. Kwiat, 'Modeling the Spread of Active Worms', In Proc, of IEEE Infocom, 2003
  5. J. C. Frauenthal, Mathematical Modeling in Epidemiology, Springer-Verlag, New York, 1980
  6. Glenn Gebhart, Worm Propagation and Countermeasures, SANS Institute, 2004
  7. J. Y. Jung, S. Schechter, and Arthur W. Berger, 'Fast Detection of Scanning Worm Infections', RAID 2004, Sophia Antipolis, France, Sep. 2004
  8. J. O. Kephart and S. R. White, 'Directed-graph Epidemiological Models of Computer Viruses', Proc. of the IEEE Symposium on Security and Privacy, pp343-359, 1991
  9. J. O. Kephart, D. M. Chess and S. R. White, 'Computers and Epidemiology', IEEE Spectrum, 1993
  10. D. M. Kienzie and M. C. Elder, 'Recent Worms: A Survey and Trends'
  11. Jose Nazario, Defense and Detection Strategies against Internet Worms, Artech House, 2004
  12. S. Staniford, V. Paxon and N. Weaver, 'How to Own the Internet in Your Spare Time', 11th Usenix Security Symposium, San Francisco, August, 2002
  13. Arrigo Triulzi, 'Intrusion Detection Systems and IPv6', SPI2003
  14. N. Weaver. Warhol Worms: The Potential for Very Fast Internet Plagues, http://www.cs.berkeley.edu/~nweaver/warhol.html
  15. N. Weaver, V. Paxson, S. Staniford, and R. Cunningham, 'A Taxonomy of Computer Wormsn', ACM WORM'03, Washington DC, USA, Oct. 2003
  16. Webopedia, 'Virus', Webopedia URL:http://www.webopedia.com/TERM/v/virus.html, Feb. 2005
  17. Webopedia, 'Worm', Webopedia URL:http://www.webopedia.com/TERM/W/worm.html, Feb. 2005
  18. Jing Yang, 'Fast Worm Propagation in IPv6 Networks'
  19. Cliff Changchun Zou, Weibo Gong, Don Towsley, 'Code Red Worm Propagation Modeling and Analysis', 9th ACM Conference on Computer and Communication Security (CCS' 02), Washington, DC, USA, Nov. 2002
  20. Cliff Changchun Zou, Weibo Gong, Don Towsley, 'Worm Propagation Modeling and Analysis under Dynamic Quarantine Defense', ACM WORMS' 03, Washington DC, USA, Oct. 2003
  21. C. C. Zou, D. Towsley, W. Gong, and S. Cai, Routing Worm: a Fast, Selective Attack Worm based on IP Address Information, Univ. of Massachusetts Tech. Report TRCSE-03-06, Nov. 2003
  22. Cliff Changchun Zou, Don Towsley, Weibo Gong, On the Performance of Internet Worm Scanning Strategies, Tech. Report: TR-03-CSE-07, Department of Computer Science, Univ. of Massachusetts, Amherst, USA
  23. Cliff Changchun Zou, Don Towsley, Weibo Gong, On the Performance of Internet Worm Scanning Strategies, Tech. Report: TR-03-CSE-07, Department of Computer Science, Univ. of Massachusetts, Amherst, USA.
  24. httpt//www.tracking-hackers.com