참고문헌
- CERT, 'CERT Advisory CA-2001-26 Nimda Worm, Sept. 2001. http://www.cert.org/advisories/CA-2001-26. html
- CERT Advisory CA-2003-04: 'MS-SQL Server Worm,' Jan., 2003. http://www.cert.org/advisories/CA-2003-04.html
- CERT, 'CERT Advisory CA-2001-08 Code Red Worm Exploiting Buffer Overflow in IIS Indexing Service DLL,' July, 2001. http://www.cert.org/incident_notes/IN-2001-08.html
- CERT Advisory CA-2001-09: 'Code Red II: Another Worm Exploiting Buffer Overflow,' IIS Indexing Service DLL, Aug. 2001. http://www.cert.org/ incident_notes/IN-2001-09.html
- CERT, 'CERT Advisory CA-2000-04 Love Letter Worm, May 2002. http://www.cert.org/advisories/CA2000-04.html
- S. Sidiroglou and A. D. Keromytis, 'A Network Worm Vaccine Architecture,' Proc. of the IEEE Workshop on Enterprise Technologies: Infrastructure for Collaborative Enterprises (WETICE), Workshop on Enterprise Security, pp.220-225, June, 2003
- D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford and N. Weaver, 'Inside the Slammer worm,' IEEE Security and Privacy, Vol.1, pp.33-39, July, 2003 https://doi.org/10.1109/MSECP.2003.1219056
- Matthew M. Williamson, 'Throttling Viruses: Restricting propagation to defeat malicious mobile code,' Proc. of the 18th Annual Computer Security Applications Conference; Dec., 2002 https://doi.org/10.1109/CSAC.2002.1176279
- J. Twycross and M. M. Williamson, 'Implementing and testing a virus throttle,' Proc. of the 12th USENIX Security Symposium, pp.285-294, Aug., 2003
- X. Qin, D. Dagon, G. Gu, and W. Lee, 'Worm detection using local networks,' Technical report, College of Computing, Georgia Tech., Feb., 2004
- J. Jung, V. Paxson, A. W. Berger, and H. Balakrishnan, 'Fast port-scan detection using sequential hypothesis testing,' Proc. of the IEEE Symposium on Security and Privacy, May, 2004 https://doi.org/10.1109/SECPRI.2004.1301325
- J. Jung, S. E. Schechter, and A. W. Berger, 'Fast Detection of Scanning Worm Infections,' Proc. of 7th International Symposium on Recent Advances in Intrusion Detection (RAID), Sophia Antipolis, French Riviera, France. Sept., 2004
- C. C. Zou, W. Gong, and D. Towsley, 'Worm Propagation Modeling and Analysis under Dynamic Quarantine Defense,' ACM CCS Workshop on Rapid Malcode (WORM'03), Washington DC, Oct., 2003 https://doi.org/10.1145/948187.948197
- C. Zou, L. Gao, W. Gong, D. Towsley, 'Monitoring and early warning for Internet worms,' ACM Conference on Computer and Communications Security, Washington, DC, Oct., 2003 https://doi.org/10.1145/948109.948136
- N. Gulati, C. Williamson and R. Bunt, 'LAN traffic locality: Characterization and application,' Proc. of the First International Conference of Local Area Network Interconnection, pp.233-250. Plenum, Oct., 1993
- 심재홍, 김장복, 최경희, 정기현, 'Virus Throttling의 웜 탐지오판 감소 및 탐지시간 단축', 정보처리학회논문지C, 제 12-C편, 제6호, pp. 847-854, 2005. 10 https://doi.org/10.3745/KIPSTC.2005.12C.6.847
- J. Kim, J. Shim, G. Jung, and K. Choi, 'Reducing Worm Detection Time and False Alarm in Virus Throttling,' LNAI, Vol. 3802, pp.297-302, Dec., 2005