참고문헌
- "인터넷침해사고 동향 및 분석월보", 한국정보 보호진흥원, 2008.
- Cliff Changchun Zou, Don Towsley, Weibo Gong, "On the Performance of Internet Worm Scanning Strategies," Elsevier Journal of Performance Evaluation, Vol.63, No.7, pp.700-723, 2006. https://doi.org/10.1016/j.peva.2005.07.032
- Cliff Changchun Zou, Weibo Gong, Don Towsley, "Code Red Worm Propagation Modeling and Analysis," 9th ACM Conference on Computer and Communication Security (CCS'02), pp.138-147, 2002.
- "The Spread of the Sapphire/Slammer Worm," http://www.caida.org/outreach/papers/2003/sapphire/sapphire.html
- 신원, "IPv6 환경에서 인터넷 웜 확산 방식 연구", Telecommunications Review, 제19권 1호, pp.118-128, 2009.
- Cliff Changchun Zou, Lixin Gao, Weibo Gong, Don Towsley, "Monitoring and Early Warning for Internet Worms," 10th ACM Conference on Computer and Communication Security (CCS'03), pp.190-199, 2003.
- D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, N. Weaver. "Inside the Slammer Worm". IEEE Magazine on Security and Privacy, Vol.1, No.4, pp.33-39, 2003. https://doi.org/10.1109/MSECP.2003.1219056
- An Analysis of Conficker's Logic and Rendezvous Points, http://mtc.sri.com/Conficker/
- Phillip Porras and Hassen Sa¨ıdi and Vinod Yegneswaran, "A Multi-perspective Analysis of the Storm (Peacomm) Worm", CSL Technical Note, SRI International, 2007.
- Akamai Technologies, "The State of the Internet, 1Q 2009", 2009.
- Pele Li, Mehdi Salour and Xiao Su, "A Survey of Internet Worm Detection and Containment", IEEE Communications Surveys & Tutorials, 1st Quarter 2008, Vol.10, No.1, pp.20-35, 2008. https://doi.org/10.1109/COMST.2008.4483668