Worm Meets Beehive

作者: Xuxian Jiang , Dongyan Xu , Paul Ruth , Shan Lei , Jianzhong Sun

DOI:

关键词:

摘要:

参考文章(11)
Xuxian Jiang, Dongyan Xu, Collapsar: a VM-based architecture for network attack detention center usenix security symposium. pp. 2- 2 ,(2004)
Vinod Yegneswaran, Paul Barford, Dave Plonka, On the Design and Use of Internet Sinks for Network Abuse Monitoring recent advances in intrusion detection. pp. 146- 165 ,(2004) , 10.1007/978-3-540-30143-1_8
Vern Paxson, Stuart Staniford, Nicholas Weaver, Very fast containment of scanning worms usenix security symposium. pp. 3- 3 ,(2004)
Cliff Changchun Zou, Weibo Gong, Don Towsley, Code red worm propagation modeling and analysis Proceedings of the 9th ACM conference on Computer and communications security - CCS '02. pp. 138- 147 ,(2002) , 10.1145/586110.586130
Christian Kreibich, Jon Crowcroft, Honeycomb: creating intrusion detection signatures using honeypots acm special interest group on data communication. ,vol. 34, pp. 51- 56 ,(2004) , 10.1145/972374.972384
David Moore, Colleen Shannon, k claffy, Code-Red: a case study on the spread and victims of an internet worm acm special interest group on data communication. pp. 273- 284 ,(2002) , 10.1145/637201.637244
Z. Chen, L. Gao, K. Kwiat, Modeling the spread of active worms international conference on computer communications. ,vol. 3, pp. 1890- 1900 ,(2003) , 10.1109/INFCOM.2003.1209211
Matthew M. Williamson, Jamie Twycross, Implementing and testing a virus throttle usenix security symposium. pp. 20- 20 ,(2003)
L. Spitzner, The Honeynet Project: trapping the hackers ieee symposium on security and privacy. ,vol. 1, pp. 15- 23 ,(2003) , 10.1109/MSECP.2003.1193207
S. Chen, Y. Tang, Slowing down Internet worms international conference on distributed computing systems. pp. 312- 319 ,(2004) , 10.1109/ICDCS.2004.1281596