File Download
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/MSP.2005.63
- Scopus: eid_2-s2.0-20844436808
- WOS: WOS:000229410500006
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: Collaborative internet worm containment
Title | Collaborative internet worm containment |
---|---|
Authors | |
Keywords | Computers Computer security |
Issue Date | 2005 |
Publisher | I E E E, Computer Society. The Journal's web site is located at http://www.computer.org/security/ |
Citation | Ieee Security And Privacy, 2005, v. 3 n. 3, p. 25-33 How to Cite? |
Abstract | Large-scale worm outbrakes that leads to distributed denial-of-dervice attacks pose a major threat to internet infrastructure security. To prevent computers from such attacks deployment of fast, scalable security overlay networks based on distributed hash tables to facilitate high-speed intrusion detection and alert-information exchange are proposed. An effective system for worm detection and cyberspace defence must have robustness, cooperation among multiple sites, responsiveness to unexpected worms and efficiency and scalability. Deployment of collaborative WormShield monitors on just 1 percent of the vulnerable edge networks can detect worm signatures roughly 10 times faster than with independent monitors. |
Persistent Identifier | http://hdl.handle.net/10722/44726 |
ISSN | 2023 Impact Factor: 2.9 2023 SCImago Journal Rankings: 0.786 |
ISI Accession Number ID | |
References |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Cai, M | en_HK |
dc.contributor.author | Hwang, K | en_HK |
dc.contributor.author | Kwok, YK | en_HK |
dc.contributor.author | Song, S | en_HK |
dc.contributor.author | Chen, Y | en_HK |
dc.date.accessioned | 2007-10-30T06:08:52Z | - |
dc.date.available | 2007-10-30T06:08:52Z | - |
dc.date.issued | 2005 | en_HK |
dc.identifier.citation | Ieee Security And Privacy, 2005, v. 3 n. 3, p. 25-33 | en_HK |
dc.identifier.issn | 1540-7993 | en_HK |
dc.identifier.uri | http://hdl.handle.net/10722/44726 | - |
dc.description.abstract | Large-scale worm outbrakes that leads to distributed denial-of-dervice attacks pose a major threat to internet infrastructure security. To prevent computers from such attacks deployment of fast, scalable security overlay networks based on distributed hash tables to facilitate high-speed intrusion detection and alert-information exchange are proposed. An effective system for worm detection and cyberspace defence must have robustness, cooperation among multiple sites, responsiveness to unexpected worms and efficiency and scalability. Deployment of collaborative WormShield monitors on just 1 percent of the vulnerable edge networks can detect worm signatures roughly 10 times faster than with independent monitors. | en_HK |
dc.format.extent | 452586 bytes | - |
dc.format.extent | 2151 bytes | - |
dc.format.mimetype | application/pdf | - |
dc.format.mimetype | text/plain | - |
dc.language | eng | en_HK |
dc.publisher | I E E E, Computer Society. The Journal's web site is located at http://www.computer.org/security/ | en_HK |
dc.relation.ispartof | IEEE Security and Privacy | en_HK |
dc.rights | ©2005 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. | - |
dc.subject | Computers | en_HK |
dc.subject | Computer security | en_HK |
dc.title | Collaborative internet worm containment | en_HK |
dc.type | Article | en_HK |
dc.identifier.openurl | http://library.hku.hk:4550/resserv?sid=HKU:IR&issn=1540-7993&volume=3&issue=3&spage=25&epage=33&date=2005&atitle=Collaborative+Internet+worm+containment | en_HK |
dc.identifier.email | Kwok, YK:ykwok@eee.hku.hk | en_HK |
dc.identifier.authority | Kwok, YK=rp00128 | en_HK |
dc.description.nature | published_or_final_version | en_HK |
dc.identifier.doi | 10.1109/MSP.2005.63 | en_HK |
dc.identifier.scopus | eid_2-s2.0-20844436808 | en_HK |
dc.identifier.hkuros | 105728 | - |
dc.relation.references | http://www.scopus.com/mlt/select.url?eid=2-s2.0-20844436808&selection=ref&src=s&origin=recordpage | en_HK |
dc.identifier.volume | 3 | en_HK |
dc.identifier.issue | 3 | en_HK |
dc.identifier.spage | 25 | en_HK |
dc.identifier.epage | 33 | en_HK |
dc.identifier.isi | WOS:000229410500006 | - |
dc.publisher.place | United States | en_HK |
dc.identifier.scopusauthorid | Cai, M=7202863417 | en_HK |
dc.identifier.scopusauthorid | Hwang, K=7402426691 | en_HK |
dc.identifier.scopusauthorid | Kwok, YK=7101857718 | en_HK |
dc.identifier.scopusauthorid | Song, S=8875389000 | en_HK |
dc.identifier.scopusauthorid | Chen, Y=7601429477 | en_HK |
dc.identifier.issnl | 1540-7993 | - |