Modeling the Propagation of Worms in Networks: A Survey
Tóm tắt
Từ khóa
Tài liệu tham khảo
wen, 2012, Modeling propagation dynamics of social network worms, IEEE Trans Parallel Distrib Syst
moore, 2004, Caida: The nyxem email virus: analysis and inferences
roberts, 2003, Mathematical models in epidemiology, Mathematical Models
0, Iloveyou virus lessons learned report Army Forces Command
0, F-Secure (2011) Love letter virus
0, Symantec (2004) W32 sasser worm
0, (2001) Advisories and alerts ida code red worm eEye Digital Security
0, Symantec (2001) W32 sircam worm
barabási, 1999, Emergence of scaling in random networks, Science, 286, 509, 10.1126/science.286.5439.509
xiang, 2009, Propagation of active worms: a survey, Int J Comput Syst Sci Eng, 24, 157
yong, 2009, Concept, characteristics and defending mechanism of worms, IEICE Trans Information and Systems, 92, 799
boguná, 2003, Epidemic spreading in complex networks with degree correlations, Lecture Notes in Physics Statistical Mechanics of Complex Networks, 625, 10.1007/978-3-540-44943-0_8
gao, 2013, Modeling and restraining mobile virus propagation, IEEE Trans Mob Comput, 10.1109/TMC.2012.29
garfinkel, 2005, When virtual is harder than real: Security challenges in virtual machine based computing environments, HOTOS
jovanovi?, 2001, Modeling peer-to-peer network topologies through small-world models and power laws, Proc IX Telecommunications Forum TELFOR, 1
yan, 2011, Malware propagation in online social networks: nature, dynamics, and defense implications, Proc ACM Symp Information Computer Communications Security, 196
staniford, 2002, How to own the internet in your spare time, Usenix Security Symp, 149
moore, 2001, The spread of the code-red worm (crv2)
chen, 2005, Importance-scanning worm using vulnerable-host distribution, Global Telecommunications Conf 2005 GLOBECOM '05 IEEE, 3, 6
moore, 2001, Caida analysis of code-red, Cooperative Association for Internet Data Analysis
anderson, 1992, Infectious Diseases of Humans Dynamics and Control, 28
daley, 2001, Epidemic Modelling An Introduction, 15
dagon, 2006, Modeling botnet propagation using time zones, NDSS, 6, 2
foster, 2004, Colleges brace for the next worm, The Chronicle of Higher Education, 50
0, Symantec (2008) W32 downadup (win32/conficker)
weafer, 2010, Downadup/conficker and april fools day One year later
bailey, 1975, The mathematical theory of infectious diseases and its applications Charles Griffin & Company Ltd 5a Crendon Street High Wycombe Bucks HP13 6LE
fossi, 2011, Symantec internet security threat report trends for2010, Volume, 16, 20
wu, 2004, An effective architecture and algorithm for detecting worms with various scan, NDSS
2010, W32.stuxnet, 2010, Symantec
wang, 2000, On computer viral infection and the effect of immunization, Comput Sec Applicat 2000 ACSAC'00 16th Annu Conf, 246
erdos, 1960, On the evolution of random graphs, Publ Math Inst Hungar Acad Sci, 5, 17
0, W32 koobface
weaver, 2001, A brief history of the worm, BUGTRAQ Security Focus Online, 26
2001, eEye Digital Security Blaster Worm Analysis