{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:14:58Z","timestamp":1763468098200},"publisher-location":"New York, NY","reference-count":35,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781461419808"},{"type":"electronic","value":"9781461419815"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-1-4614-1981-5_7","type":"book-chapter","created":{"date-parts":[[2012,9,24]],"date-time":"2012-09-24T18:57:39Z","timestamp":1348513059000},"page":"149-170","source":"Crossref","is-referenced-by-count":4,"title":["Modeling Internet-Scale Policies for Cleaning up Malware"],"prefix":"10.1007","author":[{"given":"Steven","family":"Hofmeyr","sequence":"first","affiliation":[]},{"given":"Tyler","family":"Moore","sequence":"additional","affiliation":[]},{"given":"Stephanie","family":"Forrest","sequence":"additional","affiliation":[]},{"given":"Benjamin","family":"Edwards","sequence":"additional","affiliation":[]},{"given":"George","family":"Stelle","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,7,27]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Ajelli M, Lo\u00a0Cigno R, Montresor A (2010) Modeling botnets and epidemic malware. In: 2010 IEEE international conference on communications (ICC), pp 1\u20135","DOI":"10.1109\/ICC.2010.5502265"},{"key":"7_CR2","first-page":"55","volume-title":"Managing information risk and the economics of security","author":"R Anderson","year":"2008","unstructured":"Anderson R, B\u00f6hme R, Clayton R, Moore T (2008) Security economics and European policy. In: Johnson ME (ed) Managing information risk and the economics of security, Springer, Berlin, pp 55\u201380"},{"issue":"5799","key":"7_CR3","doi-asserted-by":"publisher","first-page":"610","DOI":"10.1126\/science.1130992","volume":"314","author":"R Anderson","year":"2006","unstructured":"Anderson R, Moore T (2006) The economics of information security. Science 314(5799):610\u2013613","journal-title":"Science"},{"key":"7_CR4","volume-title":"Infectious diseases of humans dynamics and control","author":"RM Anderson","year":"1992","unstructured":"Anderson RM, May RM (1992) Infectious diseases of humans dynamics and control. Oxford University Press, Oxford"},{"key":"7_CR5","first-page":"443","volume-title":"Worm versus alert: who wins in a battle for control of a large-scale network? In: Proceedings of the 11th international conference on principles of distributed systems, OPODIS\u201907","author":"J Aspnes","year":"2007","unstructured":"Aspnes J, Rustagi N, Saia J (2007) Worm versus alert: who wins in a battle for control of a large-scale network? In: Proceedings of the 11th international conference on principles of distributed systems, OPODIS\u201907, Springer, Berlin, pp 443\u2013456"},{"key":"7_CR6","unstructured":"Association II (2010) Internet service providers voluntary code of practice for industry self-regulation in the area of cyber security. \n                http:\/\/iia.net.au\/images\/resources\/pdf\/iiacybersecuritycode_implementation_dec2010.pdf"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Chang H, Jamin S, Willinger W (2003) Internet connectivity at the AS-level: an optimization-driven modeling approach. In: MoMeTools \u201903: Proceedings of the ACM SIGCOMM workshop on models, methods and tools for reproducible network research, ACM, New York, NY, USA, pp 33\u201346. DOI\u00a010.1145\/944773.944780","DOI":"10.1145\/944773.944780"},{"key":"7_CR8","volume-title":"To peer or not to peer: modeling the evolution of the Internet\u2019s AS-level topology","author":"H Chang","year":"2006","unstructured":"Chang H, Jamin S, Willinger W (2006) To peer or not to peer: modeling the evolution of the Internet\u2019s AS-level topology. In: Proc. IEEE INFOCOM"},{"key":"7_CR9","unstructured":"Clayton R (2010) Might governments clean up malware? In: Workshop on the economics of information security. \n                http:\/\/weis2010.econinfosec.org\/papers\/session4\/weis2010_clayton.pdf"},{"key":"7_CR10","unstructured":"Comcast: Comcast.net security\u2014constant guard. \n                http:\/\/security.comcast.net\/constantguard\/"},{"key":"7_CR11","unstructured":"Coull SE, Szymanski BK (2005) A reputation-based system for the quarantine of random scanning worms"},{"key":"7_CR12","unstructured":"Dagon D, Zou C, Lee W (2006) Modeling botnet propagation using time zones. In: In Proceedings of the 13th network and distributed system security symposium NDSS"},{"key":"7_CR13","unstructured":"van Eeten M, Asghari H, Bauer JM, Tabatabaie S (2011) Internet service providers and botnet mitigation: a fact-finding study on the Dutch market. Technical report, Netherlands Ministry of Economic Affairs, Agriculture and Innovation, The Hague. \n                http:\/\/rijksoverheid.nl\/ministeries\/eleni\/documenten-en-publicaties\/rapporten\/2011\/01\/13\/internet-service-providers-and-botnet-mitigation.html"},{"key":"7_CR14","unstructured":"van Eeten M, Bauer JM (2008) Economics of malware: security decisions, incentives and externalities. Technical report, OECD STI Working paper 2008\/1. \n                http:\/\/www.oecd.org\/dataoecd\/53\/17\/40722462.pdf"},{"key":"7_CR15","unstructured":"van Eeten M, Bauer JM, Asghari H, Tabatabaie S (2010) The role of internet service providers in botnet mitigation: an empirical analysis based on spam data. Technical report, OECD STI Working Paper 2010\/5. \n                http:\/\/www.oecd.org\/officialdocuments\/publicdisplaydocumentpdf\/?cote=dsti\/doc(2010)5&docLanguage=En"},{"key":"7_CR16","unstructured":"Evron G (2009) Dutch isps sign anti-botnet treaty. Dark Reading. \n                http:\/\/www.darkreading.com\/blog\/archives\/2009\/09\/dutch_isps_sign.html"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Fei S, Zhaowen L, Yan M (2009) A survey of internet worm propagation models. In: Broadband network multimedia technology, 2nd IEEE International Conference on IC-BNMT \u201909, pp 453\u2013457","DOI":"10.1109\/ICBNMT.2009.5348534"},{"key":"7_CR18","first-page":"1455","volume-title":"The effect of network topology on the spread of epidemics","author":"A Ganesh","year":"2005","unstructured":"Ganesh A, Massouli L, Towsley D (2005) The effect of network topology on the spread of epidemics. In: IEEE INFOCOM, pp 1455\u20131466"},{"key":"7_CR19","volume-title":"Gravity and spatial interaction models","author":"KE Haynes","year":"1984","unstructured":"Haynes KE, Fotheringham A (1984) Gravity and spatial interaction models. Sage Publications, Beverley Hills, CA"},{"issue":"3","key":"7_CR20","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/1384609.1384611","volume":"38","author":"P Holme","year":"2008","unstructured":"Holme P, Karlin J, Forrest S (2008) An integrated model of traffic, geography and economy in the internet. ACM SIGCOMM Computer Commun Rev 38(3):7\u201315","journal-title":"ACM SIGCOMM Computer Commun Rev"},{"key":"7_CR21","unstructured":"Karge S (2010) The german anti-botnet initiative. In: OECD workshop on the role of internet intermediaries in advancing public policy objectives. \n                http:\/\/www.oecd.org\/dataoecd\/42\/50\/45509383.pdf"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Lelarge M (2009) Economics of malware: epidemic risks model, network externalities and incentives. In: Proceedings of the 47th annual allerton conference on communication, control, and computing, pp 1353\u20131360","DOI":"10.1109\/ALLERTON.2009.5394516"},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"Lelarge M, Bolot J (2009) Economic incentives to increase security in the internet: the case for insurance. In: INFOCOM 2009, IEEE, pp 1494\u20131502","DOI":"10.1109\/INFCOM.2009.5062066"},{"key":"7_CR24","unstructured":"Mody N, O\u2019Reirdan M, Masiello S, Zebek J (2009) Messaging Anti-abuse working group common best practices for mitigating large scale bot infections in residential networks. \n                http:\/\/www.maawg.org\/system\/files\/news\/MAAWG_Bot_Mitigation_BP_2009-07.pdf"},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"Moore D, Shannon C, Voelker G, Savage S (2003) Internet quarantine: requirements for containing self-propagating code. In: INFOCOM 2003. Twenty-second annual joint conference of the IEEE computer and communications. IEEE societies, vol\u00a03, pp 1901\u20131910","DOI":"10.1109\/INFCOM.2003.1209212"},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Moore T, Clayton R (2008) The consequence of non-cooperation in the fight against phishing. In: Anti-phishing working group eCrime researchers summit (APWG eCrime), pp 1\u201314. URL \n                http:\/\/people.seas.harvard.edu\/~tmoore\/ecrime08.pdf","DOI":"10.1109\/ECRIME.2008.4696968"},{"issue":"3","key":"7_CR27","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1257\/jep.23.3.3","volume":"23","author":"T Moore","year":"2009","unstructured":"Moore T, Clayton R, Anderson R (2009) The economics of online crime. J Economic Perspect 23(3):3\u201320","journal-title":"J Economic Perspect"},{"key":"7_CR28","doi-asserted-by":"crossref","unstructured":"Newman MEJ (2002) Spread of epidemic disease on networks. Phys Rev E 66(1)","DOI":"10.1103\/PhysRevE.66.016128"},{"key":"7_CR29","first-page":"1485","volume-title":"Protecting against network infections: a game theoretic perspective","author":"J Omic","year":"2009","unstructured":"Omic J, Orda A, Van\u00a0Mieghem P (2009) Protecting against network infections: a game theoretic perspective. In: INFOCOM, IEEE, pp 1485\u20131493"},{"issue":"1\u20132","key":"7_CR30","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.cose.2007.11.001","volume":"27","author":"F Palmieri","year":"2008","unstructured":"Palmieri F, Fiore U (2008) Containing large-scale worm spreading in the internet by cooperative distribution of traffic filtering policies. Comput Secur 27(1\u20132):48\u201362","journal-title":"Comput Secur"},{"key":"7_CR31","unstructured":"Porras P, Saidi H, Yegneswaran V (2009) An analysis of conficker\u2019s logic and rendezvous points. Technical report, SRI International. \n                http:\/\/mtc.sri.com\/Conficker\/"},{"key":"7_CR32","doi-asserted-by":"crossref","unstructured":"Schafer J, Malinka K, Hanacek P (2008) Malware spreading models in peer-to-peer networks. In: Security technology, 42nd annual IEEE international Carnahan conference on ICCST 2008, pp 339\u2013345","DOI":"10.1109\/CCST.2008.4751325"},{"key":"7_CR33","doi-asserted-by":"crossref","unstructured":"Stone-Gross B, Moser A, Kruegel C, Kirda E, Almeroth K (2009) FIRE: FInding Rogue nEtworks. In: Proceedings of the annual computer security applications conference (ACSAC). Honolulu, HI","DOI":"10.1109\/ACSAC.2009.29"},{"key":"7_CR34","first-page":"1","volume-title":"System reliability and free riding","author":"HR Varian","year":"2004","unstructured":"Varian HR (2004) System reliability and free riding. In: Economics of information security, Kluwer Academic Publishers, Dordrecht, pp 1\u201315"},{"key":"7_CR35","first-page":"71","volume":"2005","author":"S Wei","year":"2005","unstructured":"Wei S, Mirkovic J, Swany M (2005) Distributed worm simulation with a realistic internet model. In: Principles of advanced and distributed simulation, Workshop on PADS 2005, pp 71\u201379","journal-title":"Principles of advanced and distributed simulation, Workshop on PADS"}],"container-title":["Economics of Information Security and Privacy III"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-1981-5_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,7]],"date-time":"2019-05-07T11:43:50Z","timestamp":1557229430000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4614-1981-5_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7,27]]},"ISBN":["9781461419808","9781461419815"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-1981-5_7","relation":{},"subject":[],"published":{"date-parts":[[2012,7,27]]}}}