2007
DOI: 10.1109/tdsc.2007.1002
|View full text |Cite
|
Sign up to set email alerts
|

Fast Worm Containment Using Feedback Control

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2008
2008
2013
2013

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 34 publications
(12 citation statements)
references
References 16 publications
0
12
0
Order By: Relevance
“…Contributions span from reliability [10] to security [11], software testing [12], scheduling [13], thread-pool management [14], and more. The fil rouge of virtually all the documented research is that by closing feedback loops around a computing (embedded) system, desired properties-such as a prescribed throughput-can be enforced online.…”
Section: Related Work and Motivationmentioning
confidence: 99%
“…Contributions span from reliability [10] to security [11], software testing [12], scheduling [13], thread-pool management [14], and more. The fil rouge of virtually all the documented research is that by closing feedback loops around a computing (embedded) system, desired properties-such as a prescribed throughput-can be enforced online.…”
Section: Related Work and Motivationmentioning
confidence: 99%
“…As traffic is not confined to a particular system and it is related to networks, it is essential that the proposed scheme must be of type network-based worm detection system. In the Internet there must be a provision to detect worms such as Cyber center [8], network telescope [25] and SANSISC [15]. The detections systems can be spread across WWW in order to successfully detect the presence of worms successfully.…”
Section: Worm Detectionmentioning
confidence: 99%
“…Kim and Karp proposed a scheme to automatically generate the worm payload signature through analyzing the network traffic payload [45]. Besides the detection, there is also extensive research on post-detection defense including containment, throttling, and filtering [15,[79][80][81][82][83][84][85].…”
Section: Related Workmentioning
confidence: 99%