Hybrid modeling for large-scale worm propagation Simulations
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Im, Eul Gyu | - |
dc.contributor.author | Seo, Jung Taek | - |
dc.contributor.author | Kim, Dong-Soo | - |
dc.contributor.author | Song, Yong Ho | - |
dc.contributor.author | Park, Yongsu | - |
dc.date.accessioned | 2022-12-21T11:35:23Z | - |
dc.date.available | 2022-12-21T11:35:23Z | - |
dc.date.created | 2022-08-26 | - |
dc.date.issued | 2006-05 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/181534 | - |
dc.description.abstract | Internet becomes more and more popular, and most companies and institutes use web services for e-business and many other purposes. As results, Internet and web services become core infrastructure for a company or an institute. With the explosion of Internet, the occurrence of cyber terrorism has grown very rapidly. It is difficult to find and close all security flaws in a computer system that is connected to a network. Internet worms take advantages of these security flaws, and attack a large number of hosts with self-propagating techniques. To study and analyze internet worms, one of the most feasible ways is to use simulations. It is quite challenging to simulate very large-scale worm attacks. In this paper, we propose a hybrid model for large-scale worm propagation simulations. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | SPRINGER-VERLAG BERLIN | - |
dc.title | Hybrid modeling for large-scale worm propagation Simulations | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Im, Eul Gyu | - |
dc.contributor.affiliatedAuthor | Song, Yong Ho | - |
dc.contributor.affiliatedAuthor | Park, Yongsu | - |
dc.identifier.doi | 10.1007/11760146_59 | - |
dc.identifier.scopusid | 2-s2.0-33745891764 | - |
dc.identifier.wosid | 000238207800059 | - |
dc.identifier.bibliographicCitation | INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, v.3975, pp.572 - 577 | - |
dc.relation.isPartOf | INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS | - |
dc.citation.title | INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS | - |
dc.citation.volume | 3975 | - |
dc.citation.startPage | 572 | - |
dc.citation.endPage | 577 | - |
dc.type.rims | ART | - |
dc.type.docType | Article; Proceedings Paper | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Artificial Intelligence | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Interdisciplinary Applications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.subject.keywordPlus | Computer simulation | - |
dc.subject.keywordPlus | Computer worms | - |
dc.subject.keywordPlus | Internet | - |
dc.subject.keywordPlus | Security of data | - |
dc.subject.keywordPlus | Telecommunication services | - |
dc.subject.keywordAuthor | network modeling | - |
dc.subject.keywordAuthor | Internet incidents | - |
dc.subject.keywordAuthor | Internet worms | - |
dc.subject.keywordAuthor | simulation | - |
dc.identifier.url | https://link.springer.com/chapter/10.1007/11760146_59 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
222, Wangsimni-ro, Seongdong-gu, Seoul, 04763, Korea+82-2-2220-1365
COPYRIGHT © 2021 HANYANG UNIVERSITY.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.