1. Zhou L D, Zhang L T, McSherry F, et al. A first look at peer-to-peer worms: threats and defenses. Proceedings of the 4th International Workshop on Peer-to-Peer Systems (IPTPS’05), Feb 24-25, 2005, Ithaca, NY, USA. LNCS 3640. Berlin, Germany: Springer-Verlag, 2005: 24-35
2. Eichin M W, Rochlis J A. With microscope and tweezers: an analysis of the Internet virus of November 1988. Proceedings of the 1989 IEEE Symposium on Security and Privacy (S&P’89), May 1-3, 1989, Oakland, CA, USA. Los Alamitos, CA, USA: IEEE Computer Society, 1989: 326-343
3. Weaver N, Paxson V, Staniford S, et al. A taxonomy of computer worms. Proceedings of the 1st ACM Workshop on Rapid Malcode (WORM'03), Oct 27, 2003, Washington, DC, USA. New York, NY, USA: ACM, 2003: 11-18
4. Wei Y, Chellappan S, Wang X, et al. Peer-to-peer system-based active worm attacks: modeling, analysis and defense. Computer Communications, 2008, 31(17): 4005-4017
5. Zou C C, Towsley D, Gong W B. Modeling and simulation study of the propagation and defense of Internet Email worm, IEEE Transactions on Dependable and Secure Computing, 2007, 4(2): 105-118
6. Su F, Lin Z W, Ma Y. Modeling and analysis of Internet worm propagation. The Journal of China Universities of Posts and Telecommunications, 2010, 17(4): 63-68
7. Wang J, Liu Y H, Tian D X. Internet worm early detection and response mechanism. The Journal of China Universities of Posts and Telecom- munications, 2007, 14(3): 79-84
8. Xu X L, Wang R C, Xiao F. Malicious code passive propagation model and vaccine distribution model of P2P networks. Journal of Systems Engineering and Electronics, 2010, 21(1): 161-167
9. Zhang X S, Chen T, Zheng J, et al. Proactive worm propagation modeling and analysis in unstructured peer-to-peer networks. Journal of Zhejiang University, Science C: Computers & Electronics, 2010, 11(2): 119-129
10. Wang F W, Zhang Y K, Ma J F. Modeling and analyzing passive worms over unstructured peer-to-peer networks. International Journal of Network Security, 2010, 11(1): 39-45
11. Xia C H, Shi Y P, Li X J. Research on epidemic models of P2P worm in structured peer-to-peer networks. Chinese Journal of Computers, 2006, 29(6): 952-959 (in Chinese)
12. Castaneda F, Sezer E C, Xu J. WORM vs. WORM: preliminary study of an active counter-attack mechanism. Proceedings of the 2nd ACM Workshop on Rapid Malcode (WORM’04), Oct 29, 2003, Washington, DC, USA. New York, NY, USA: ACM, 2004: 83-93
13. Zou C C, Gong W B, Towsley D. Code red worm propagation modeling and analysis. Proceedings of the 9th ACM Conference on Computer and Communication Security (CCS’02), Nov 18-22, 2002, Washington DC, USA. New York, NY, USA: ACM, 2002: 138-147
14. Serazzi G, Zanero S. Computer virus propagation models. Proceedings of the 11th IEEE /ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems (MASCOTS’03), Oct 12-15, 2003, Orlando, FL, USA. LNCS 2965. Berlin, Germany: Springer-Verlag, 2004: 26-50
15. Wang C, Qin S H, He J B. Anti-worm based on hybrid confronting technology. Journal on Communications, 2007, 28(1): 28-34 (in Chinese)
16. Wang B, Ding P, Sheng J F. P2P anti-worm: modeling and analysis of a new worm counter-measurement strategy. Proceedings of the 9th International Conference for Young Computer Scientists (ICYCS’08), Nov 18-21, Zhangjiajie, China. 2008, 1553-1558 |