Back to Results
First PageMeta Content
Internet / Computer worms / Code Red / Malware / Witty / Subnetwork / Morris worm / Classless Inter-Domain Routing / Intrusion detection system / Network architecture / Routing / Computing


On the Effectiveness of Distributed Worm Monitoring Moheeb Abu Rajab Fabian Monrose Andreas Terzis
Add to Reading List

Document Date: 2008-08-14 14:22:43


Open Document

File Size: 564,23 KB

Share Result on Facebook

Company

Intrusion Detection Systems / /

Currency

pence / /

/

Facility

Distributed Worm Monitoring Moheeb Abu Rajab Fabian Monrose Andreas Terzis Computer Science Department Johns Hopkins University / /

IndustryTerm

detection systems / target selection algorithm / power-law distribution / distributed monitoring systems / realistic distributed monitoring infrastructure / power law / automated distributed infrastructure / computing / biased target selection algorithm / networks using network management tools / operational networks / distributed monitoring infrastructure / power law distribution / automatic containment solutions / Internet worms / target selection algorithms / /

Organization

Johns Hopkins University / MB MC / /

Person

Abu Rajab Fabian Monrose Andreas Terzis / /

/

ProvinceOrState

Manitoba / /

Technology

target selection algorithms / IPv4 / Simulation / Nimda-like target selection algorithm / biased target selection algorithm / PDF / /

SocialTag