Information Technology Reference
In-Depth Information
Points of view in this document are those of the author(s) and do not necessarily
represent the ocial position of the U.S. Department of Homeland Security or the
Science and Technology Directorate. In addition this research was supported by
SPAWAR contract N66001-04-C-6013. Accordingly, the U.S. Government retains
a non-exclusive, royalty-free license to publish or reproduce the published form
of this contribution, or allow others to do so, for U.S. Government purposes.
References
1. Chen, Z., Gao, L., Kwiat, K.: Modeling the spread of active worms. In
INFOCOM
2003
(2003)
2. Cisco. Dealing with mallocfail and high cpu utilization resulting from the “code
red” worm. http://www.cisco.com/warp/public/-63/ts codred worm.shtml (Octo-
ber 2001)
3. Daley, D.J., Gani, J.:
Epidemic Modelling: An Introduction
. Cambridge University
Press, Cambridge, UK (1999)
4. Ferrie, P., Perriot, F., Sz or, P.: Worm wars.
Virus Bulletin
(
www.virusbtn.com
),
Oct 2003.
http://www.peterszor.com/welchia.pdf
[Last accessed Oct 01, 2003
5. Liljenstam, M., Nicol, D., Berk, V., Gray, B.: Simulating realistic network worm
trac for worm warning system design and testing. In
in Proc. of the First ACM
Workshop on Rapid Malcode (WORM'03)
(Oct 2003)
6. Moore, D., Shannon, C., Claffy, K.: Code-red: a case study on the spread and
victims of an internet worm. In
in Proc. of the Internet Measurement Workshop
(IMW)
, Marseille, France, Nov 2002. ACM Press
7. Moore, D., Shannon, C., Voelker, G., Savage, S.: Internet quarantine: Requirements
for containing self-propagating code. In
Proceedings of the 22nd Annual Joint Con-
ference of the IEEE Computer and Communications Societies (INFOCOM 2003)
(April 2003)
8. Nicol, D. M., Yan, G.: Simulation of network trac at coarse time-scales. In
Pro-
ceedings of the 2005 Conference on Principles of Advanced and Distributed Simu-
lation
(2005)
9. Ross, H.S.:
Stochastic Processes
. Wiley, New York (1983)
10. Staniford,
S.:
Code
Red
Analysis
Pages:
July
infestation
analysis.
http://www.silicondefense.com/cr/july.html (2001)
11. Staniford, S., Paxson, V., Weaver, N.: How to Own the Internet in
Your Spare Time. In
in Proc. of the USENIX Security Symposium
(2002)
http://www.icir.org/vern/papers/cdc-usenix-sec02/index.html.
12. Zou, C., Gao, L., Gong, W., Towsley, D.: Code red worm propagation modeling
and analysis. In
9th ACM Conference on Computer and Communication Security
(CCS)
, Washington DC (Nov 2002)
13. Zou, C., Gao, L., Gong, W., Towsley, D.: Monitoring and early warning for internet
worms. In
Proceedings of 10th ACM Conference on Computer and Communication
Security (CCS'03)
(2003)
14. Zou, C., Gong, W., Towsley, D.: Worm propagation modeling and analysis. In
Proceedings of the First ACM Workshop on Rapid Malcode (WORM)
(2003)