References
- CERT, 'CERT Advisory CA-2003-04 MS-SQL Server Worm,' Jan. 2003. http://www.cert.org/advisories/CA-2003-04.html
- CERT, 'CERT Advisory CA-2001-09 Code Red II Another Worm Exploiting Buffer Overflow in IIS Indexing Service DLL,' Aug. 2001. http://www.cert.org/incident_notes/IN-2001-09.html
- CERT, 'CERT Advisory CA-2001-08 Code Red Worm Exploiting Buffer Overflow in IIS Indexing Service DLL,' July 2001. http://www.cert.org/incident_notes/IN-2001-08.html
- CERT, 'CERT Advisory CA-2001-26 Nimda Worm,' Sept. 2001. http://www.cert.org/advisories/CA-2001-26.html
- Matthew M. Williamson, 'Throttling Viruses: Restricting propagation to defeat malicious mobile code,' Proc. of the 18th Annual Computer Security Applications Conference, Dec. 2002 https://doi.org/10.1109/CSAC.2002.1176279
- J. Twycross and M. M. Williamson, 'Implementing and testing a virus throttle,' Proc. of the 12th USENIX Security Symposium, pp. 285-294, Aug. 2003
- X. Qin, D. Dagon, G. Gu, and W. Lee, 'Worm detection using local networks,' Technical report, College of Computing, Georgia Tech., Feb. 2004
- J. Jung, S. E. Schechter, and A. W. Berger, 'Fast Detection of Scanning Worm Infections,' Proc. of 7th International Symposium on Recent Advances in Intrusion Detection (RAID), Sophia Antipolis, French Riviera, France, Sept. 2004
- J. Jung, V. Paxson, A. W. Berger, and H. Balakrishnan, 'Fast portscan detection using sequential hypothesis testing,' Proc. of the IEEE Symposium on Security and Privacy, May 2004 https://doi.org/10.1109/SECPRI.2004.1301325
- C. C. Zou, W. Gong, and D. Towsley, 'Worm Propagation Modeling and Analysis under Dynamic Quarantine Defense,' ACM CCS Workshop on Rapid Malcode (WORM'03), Washington DC, Oct.2003 https://doi.org/10.1145/948187.948197
- C. Zou, L. Gao, W. Gong, D. Towsley, 'Monitoring and early warning for Internet worms,' ACM Conference on Computer and Communications Security, Washington, DC, Oct. 2003 https://doi.org/10.1145/948109.948136
- Jangbok Kim, Jaehong Shim, Gihyun Jung, and Kyunghee Choi, 'Reducing Worm Detection Timeand False Alarm in Virus Throttling,' LNAI 3802, p.297, December 2005
- Stuart Staniford, 'Containment of scanning worms in enterprise networks,' Journal of Computer Security, 2004
- David Whyte, Evangelos Kranakis, P.C. van Oorschot, 'DNS-based Detection of Scanning Wormsin an Enterprise Network,' In Proc. of the 12th Annual Network and Distributed System Security Symposium, Feb. 2005