References
- 전용희, 장종수, 손승원, '미국의 정보인프라 보호 연구개발 동향 분석', 전자통신동향분석, 제19권 제4호, pp. 96-108, 한국전자통신연구원, 2004년 8월
- 전용희, 손승원, '정보통신 인프라 보호를 위한 미국의 연구개발 동향', 한국통신학회지 제 21권 제9호, pp. 1033-1047, 2004년 9월
- 전용희, '인터넷 웜의 탐지 및 대응기술', 한국통신학회지 제22권 제8호, pp. 1088-1103, 2005년 8월
- 신승원, 오진태, 김기영, 장종수, ' 인터넷 웜 공격 탐지 방법 동향', 전자통신동향분석, 제 20권 제1호. pp. 9-16, 2005년 2월
- David J. Albanese et al., The Case for Using Layered Defenses to Stop Worms, Report #C43-002R-2004, Ver. 1.0, June 18, 2004, National Security Agency, USA
- Min Cai et al., 'Collaborative Internet Worm Containment', IEEE Security and Privacy, pp.24-33, May/June 2005
- Shigang Chen and Yong Tang, 'Slowing Down Internet Worms', Proc. of 24th IEEE International Conference on Distributed Computing Systems(ICDCS'04), Tokyo, Japan, March 2004
- Z. Chen, L. Gao, and K. Kwiat, 'Modeling the Spread of Active Worms', INFOCOM, pp.1890-1900, April 2003, California
- Gregory R. Ganger, Gregg Economou, and Stanley M. Bielski. Self-Securing Network Interfaces: What, Why and How. Technical Report
- J. Y. Jung, S. Schechter, and Arthur W. Berger, 'Fast Detection of Scanning Worm Infections', RAID 2004, Sophia Antipolis, France, Sep. 2004
- Hyang-Ah Kim and Brad Karp, 'Autograph: Toward Automated Distributed Worm Signature Detection', Proc. of Usenix Security Sym., pp.271-286, 2004
- D. Moore et al., 'Internet Quarantine Requirements for Containing Self-Propagating Codes', Proc. IEEE INFOCOM. pp 1901-1910, IEEE CS Press, 2003
- Jose Nazario, Defense and Detection Strategies against Internet Worms, Artech House, 2004
- Stuart E. Schechter, Jaeyoun Jung, and Arthur W. Berger, 'Fast Detection of Scanning Worm Infections'. Proc. of 7th International Symposium on Recent Advances in Intrusion Detection (RAID), Sep. 2004, France
- Stelios Sidiroglou and Angelos D. Keromytis 'Countering Network Worms Through Automatic Patch Generation IEEE Security and Privacy, 2005
- Sumeet Singh et al, 'Automated Worm Fingerprinting'. Proc. of Usenix Symp. Operating System Design and Implementation, pp.45-60. 2004
- Ed Skoudis, Lenny Zeltser, Malware: Fighting Malicious Code, Prentice-Hall, 2004
- S. Staniford, V. Paxon and N. Weaver, 'How to Own the Internet Spare Time', 11th Usenix Security Symposium, San Francisco, August 2002
- Helen J. Wang et al., 'Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits', Proc. of ACM SIGCOMM '04, Aug. 30-Sep. 3, 2004, USA
- N. Weaver, S. Staniford, and V. Paxson, 'Very Fast Containment of Scanning Worms'. Proc. of 13th USENIX Security Symposium pp29-44. August 2004. California
- Matthew M. Williamson, 'Throttling Viruses: Restricting propagation to defeat malicious code', Proc. of ACSAC Security Conference. pp.61-68. 2002
- Cynthia Wong, Chenxi Wang, Dawn Song, Stanley M. Bielski, and Gregory R. Ganger, 'Dynamic Quarantine of Internet Worms', The International Conf. on Dependable Systems and Networks (DSN-2004) pp.62-71. 2004
- Cynthis Wong, Stan Bielski, Ahren Studer, Chenxi Wang, On the Effectiveness of Rate Limiting Mechanisms, CMU-PDL-05-103. Carnegie Mellon University, March 2005
- Cliff C. Zou, Weibo Gong, Don Towsley, 'Worm Propagation Modeling and Analysis under Dynamic Quarantine Defense'. ACM WORM '03, Washington DC, USA, Oct.2003
- Cliff C. Zou et al., 'Monitoring and Early Warning for Internet Worms'. Proc. of 10th ACM Conf. Computer and Comm. Security(CCS 03). pp. 190-199, Oct. 2003