A First Look at Peer-to-Peer Worms: Threats and Defenses
暂无分享,去创建一个
Steve Chien | Nicole Immorlica | Lidong Zhou | Lintao Zhang | Frank McSherry | Manuel Costa | Frank McSherry | Nicole Immorlica | Manuel Costa | Lidong Zhou | Lintao Zhang | Steve Chien
[1] Kenneth L. Calvert,et al. Modeling Internet topology , 1997, IEEE Commun. Mag..
[2] Peter Druschel,et al. Pastry: Scalable, distributed object location and routing for large-scale peer-to- , 2001 .
[3] Mark Handley,et al. A scalable content-addressable network , 2001, SIGCOMM '01.
[4] Antony I. T. Rowstron,et al. Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.
[5] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[6] Matthew M. Williamson,et al. Throttling viruses: restricting propagation to defeat malicious mobile code , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[7] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.
[8] Fred B. Schneider,et al. COCA: a secure distributed online certification authority , 2002 .
[9] Miguel Castro,et al. Secure routing for structured peer-to-peer overlay networks , 2002, OSDI '02.
[10] Donald F. Towsley,et al. Monitoring and early warning for internet worms , 2003, CCS '03.
[11] Brian D. Noble,et al. Samsara: honor among thieves in peer-to-peer storage , 2003, SOSP '03.
[12] David Moore,et al. Internet quarantine: requirements for containing self-propagating code , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[13] Robert K. Cunningham,et al. A taxonomy of computer worms , 2003, WORM '03.
[14] Scott Shenker,et al. Making gnutella-like P2P systems scalable , 2003, SIGCOMM '03.
[15] David Zhang,et al. Secure program execution via dynamic information flow tracking , 2004, ASPLOS XI.
[16] Stefan Saroiu,et al. Measurement and analysis of spywave in a university environment , 2004 .
[17] B. Karp,et al. Autograph: Toward Automated, Distributed Worm Signature Detection , 2004, USENIX Security Symposium.
[18] Hari Balakrishnan,et al. Fast portscan detection using sequential hypothesis testing , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[19] Miguel Castro,et al. Can we contain Internet worms , 2004 .
[20] J. Crowcroft,et al. Honeycomb: creating intrusion detection signatures using honeypots , 2004, Comput. Commun. Rev..
[21] Stefan Saroiu,et al. Measurement and Analysis of Spyware in a University Environment , 2004, NSDI.
[22] Ben Y. Zhao,et al. Tapestry: a resilient global-scale overlay for service deployment , 2004, IEEE Journal on Selected Areas in Communications.
[23] Frederic T. Chong,et al. Minos: Control Data Attack Prevention Orthogonal to Memory Model , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[24] Vern Paxson,et al. Very Fast Containment of Scanning Worms , 2004, USENIX Security Symposium.
[25] Sumeet Singh,et al. The EarlyBird System for Real-time Detection of Unknown Worms , 2005 .