[ Pobierz całość w formacie PDF ]
[5] O. Andreasson. IPTables Tutorial 1.1.19. http://iptables-tutorial.frozentux.net/iptables-tutorial.html
[6] L. Billings, W. M. Spears, and I. B. Schwartz (2002). A Unified Prediction of Computer Virus
Spread in Connected Networks. Physics Letters A, 297, 261-266.
[7] M. Bishop. Robust Programming. Technical report. University of California, Davis, California,
2002. http://nob.cs.ucdavis.edu/bishop/secprog/robust.html.
[8] Z. Chen, L. Gao, and K. Kwiat. Modeling the Spread of Active Worms. In Proceedings of the 22nd
Annual Joint Conference of the IEEE Computers and Communications Societies (INFOCOM),
volume 3, pages 1890-1900, San Francisco, California, April 2003.
[9] C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang, and H.
Hinton. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-overflow Attacks. In
Proceedings of the 7th USENIX Security Conference, pages 63-78, San Antonio, Texas, January
1998.
[10] D. Denning (1987).An Intrusion Detection Model. IEEE Transactions on Software Engineering,
13(2):222 232
[11] M. Garetto, W. Gong, and D. Towsley. Modeling Malware Spreading Dynamics. In Proceedings of
the 22nd Annual Joint Conference of the IEEE Computers and Communications Societies
(INFOCOM), volume 3, pages 1869-1879, San Francisco, California, April 2003.
[12] J. Jung, V. Paxson, A. W. Berger, and H. Balakrishnan. Fast Portscan Detection Using Sequential
Hypothesis Testing. In Proceedings of the 2004 IEEE Symposium on Security and Privacy, to
appear, 2004.
[13] J. Kephart and S. White. Measuring and Modeling Computer Virus Prevalence. In Proceedings of
the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, pages 2-14,
Oakland, California, May 1993.
[14] D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. The Spread of the
Sapphire/Slammer Worm. Technical Report, The Cooperative Association for Internet Data
Analysis (CAIDA). http://www.caida.org/outreach/papers/2003/sapphire/sapphire.html.
[15] D. Moore and C. Shannon. Code-Red: A Case Study on the Spread and Victims of an Internet
Worm. In Proceedings of the 2002 ACM SIGCOMM Internet Measurement Workshop, pages 273-
284, Marseille, France, November 2002.
[16] D. Moore, C. Shannon, G. Voelker, and S. Savage. Internet Quarantine: Requirement for Containing
Self-propagating Code. In Proceedings of the 22nd Annual Joint Conference of the IEEE Computers
and Communications Societies (INFOCOM), volume 3, pages 1901-1910, San Francisco,
California, April 2003.
[17] S. E. Schechter. J. Jung, A. W. Berger. Fast Detection of Scanning Worm Infections. In Proceedings
of the 7th International Symposium on Recent Advances in Intrusion Detection (RAID), French
Riviera, France, September 2004.
12
[18] W. M. Spears, L. Billings, and I. B. Schwartz. Modeling Viral Epidemiology in Connected
Networks. NRL Memorandum Report NRL/MR/6700--01-8537.
[19] J. Viega and G. McGraw. Buffer overflows. In Building Secure Software: How to Avoid Security
Problems the Right Way, Chapter 7, pages 135-185. Addison-Wesley, Boston, Massachusetts,
September 2001.
[20] T. Wang. Integer Hash Function. Technical Report. Avalable from
http://www.concentric.net/~Ttwang/tech/inthash.htm.
[21] N. Weaver, S. Staniford, and V. Paxson. Very Fast Containment of Scanning Worms. In
Proceedings of the 13th USENIX Security Symposium, pages 29-44, San Diego, California August
2004.
[22] D. Whyte, E. Kranakis, and P. van Oorschot. DNS-based Detection of Scanning Worms in an
Enterprise Network. In Proceedings of the 12th Network and Distributed System Security Symposium
(NDSS), pages 181-195, February 2005.
[23] D. Whyte, E. Kranakis, and P. C. van Oorschot. ARP-based Detection of Scanning Worms in an
Enterprise Network. Technical Report, School of Computer Science, Carleton University, October
2004.
[24] M. Williamson. Throttling viruses: Restricting propagation to defeat malicious mobile code. In
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002),
December 9 13, 2002
[25] C. Zou, D. Towsley, and W.Gong. On the Performance of Internet Worm Scanning Strategies. On
the performance of lnternet worm scanning strategies, Umass ECE Technical Report TR-03-CSE-
07, 2003.9:1-15. Submitted to Journal of Performance Evaluation.
__________________________
Copyright © 2005 Intel Corporation.
The terms Intel and XScale are registered trademarks of Intel Corporation.
13
[ Pobierz całość w formacie PDF ]