{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:46:02Z","timestamp":1725518762758},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540874027"},{"type":"electronic","value":"9783540874034"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-87403-4_13","type":"book-chapter","created":{"date-parts":[[2008,9,17]],"date-time":"2008-09-17T11:42:05Z","timestamp":1221651725000},"page":"231-250","source":"Crossref","is-referenced-by-count":1,"title":["Optimal Cost, Collaborative, and Distributed Response to Zero-Day Worms - A Control Theoretic Approach"],"prefix":"10.1007","author":[{"given":"Senthilkumar G.","family":"Cheetancheri","sequence":"first","affiliation":[]},{"given":"John-Mark","family":"Agosta","sequence":"additional","affiliation":[]},{"given":"Karl N.","family":"Levitt","sequence":"additional","affiliation":[]},{"given":"Felix","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Jeff","family":"Rowe","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Anagnostakis, K.G., et al.: A cooperative immunization system for an untrusting internet. In: Proc. of IEEE ICON, October 2003, pp. 403\u2013408 (2003)","key":"13_CR1","DOI":"10.1109\/ICON.2003.1266224"},{"key":"13_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1007\/11836810_31","volume-title":"Information Security","author":"K.G. Anagnostakis","year":"2006","unstructured":"Anagnostakis, K.G., Greenwald, M.B., Ioannidis, S., Keromytis, A.D.: Robust reactions to potential day-zero worms through cooperation and validation. In: Katsikas, S.K., L\u00f3pez, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. LNCS, vol.\u00a04176, pp. 427\u2013442. Springer, Heidelberg (2006)"},{"issue":"3","key":"13_CR3","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1145\/971617.971646","volume":"47","author":"R. Bajcsy","year":"2004","unstructured":"Bajcsy, R., et al.: Cyber defense technology networking and evaluation. Commun. of the ACM\u00a047(3), 58\u201361 (2004)","journal-title":"Commun. of the ACM"},{"key":"13_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1007\/978-3-540-45248-5_8","volume-title":"Recent Advances in Intrusion Detection","author":"I. Balepin","year":"2003","unstructured":"Balepin, I., Maltsev, S., Rowe, J., Levitt, K.: Using specification-based intrusion detection for automated response. In: Vigna, G., Kr\u00fcgel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol.\u00a02820, pp. 136\u2013154. Springer, Heidelberg (2003)"},{"key":"13_CR5","volume-title":"Stochastic Optimal Control: The Discrete Time Case","author":"D.P. Bertsekas","year":"1978","unstructured":"Bertsekas, D.P., Shreve, S.E.: Stochastic Optimal Control: The Discrete Time Case. Academic Press, N.Y (1978)"},{"unstructured":"Bertsekas, D.P.: Dynamic Programming and Optimal Control, 3rd edn., vol.\u00a01. Athena Scientific (2005)","key":"13_CR6"},{"issue":"3","key":"13_CR7","first-page":"34","volume":"4","author":"M. Cai","year":"2005","unstructured":"Cai, M., Hwang, K., Kwok, Y.-K., Song, S., Chen, Y.: Collaborative internet worm containment. IEEE Security and Privacy\u00a04(3), 34\u201343 (2005)","journal-title":"IEEE Security and Privacy"},{"doi-asserted-by":"crossref","unstructured":"Cheetancheri, S.G., et al.: Towards a framework for worm defense evaluation. In: Proc. of the IPCCC Malware Workshop on Swarm Intelligence, Phoenix (April 2006)","key":"13_CR8","DOI":"10.1109\/.2006.1629453"},{"key":"13_CR9","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1145\/1162666.1162668","volume-title":"Proc. of SIGCOMM LSAD","author":"S.G. Cheetancheri","year":"2006","unstructured":"Cheetancheri, S.G., Agosta, J.M., Dash, D.H., Levitt, K.N., Rowe, J., Schooler, E.M.: A distributed host-based worm detection system. In: Proc. of SIGCOMM LSAD, pp. 107\u2013113. ACM Press, New York (2006)"},{"key":"13_CR10","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1145\/1095810.1095824","volume-title":"Proc. of the SOSP","author":"M. Costa","year":"2005","unstructured":"Costa, M., et al.: Vigilante: end-to-end containment of internet worms. In: Proc. of the SOSP, pp. 133\u2013147. ACM Press, New York (2005)"},{"key":"13_CR11","volume-title":"Proc. of AAAI","author":"D. Dash","year":"2006","unstructured":"Dash, D., Kveton, B., Agosta, J.M., Schooler, E., Chandrashekar, J., Bachrach, A., Newman, A.: When gossip is good: Distributed probabilistic inference for detection of slow network intrusions. In: Proc. of AAAI, AAAI Press, Menlo Park (2006)"},{"key":"13_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/11663812_13","volume-title":"Recent Advances in Intrusion Detection","author":"S.-S. Hong","year":"2006","unstructured":"Hong, S.-S., Felix Wu, S.: On Interactive Internet Traffic Replay. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol.\u00a03858, pp. 247\u2013264. Springer, Heidelberg (2006)"},{"unstructured":"Kim, H.-A., Karp, B.: Autograph: Toward automated, distributed worm signature detection. In: Proc. of the USENIX Security Symposium (2004)","key":"13_CR13"},{"doi-asserted-by":"crossref","unstructured":"Lee, W., Fan, W., Miller, M., Stolfo, S.J., Zadok, E.: Towards cost-sensitive modeling for intrusion detection and response. J. of Computer Security\u00a010(1,2) (2002)","key":"13_CR14","DOI":"10.3233\/JCS-2002-101-202"},{"key":"13_CR15","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1145\/1103626.1103641","volume-title":"Proc. of the WORM","author":"D.J. Malan","year":"2005","unstructured":"Malan, D.J., Smith, M.D.: Host-based detection of worms through peer-to-peer cooperation. In: Proc. of the WORM, pp. 72\u201380. ACM Press, New York (2005)"},{"key":"13_CR16","first-page":"226","volume-title":"Proc. of the IEEE Symposium on Security and Privacy","author":"J. Newsome","year":"2005","unstructured":"Newsome, J., Karp, B., Song, D.: Polygraph: Automatically generating signatures for polymorphic worms. In: Proc. of the IEEE Symposium on Security and Privacy, pp. 226\u2013241. IEEE, Los Alamitos (2005)"},{"unstructured":"Singh, S., Estan, C., Varghese, G., Savage, S.: Automated worm fingerprinting. In: Proc. of OSDI, San Francisco, CA (December 2004)","key":"13_CR17"},{"issue":"6","key":"13_CR18","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MSP.2005.144","volume":"3","author":"S. Sidiroglou","year":"2005","unstructured":"Sidiroglou, S., Keromytis, A.D.: Countering network worms through automatic patch generation. IEEE Security and Privacy\u00a03(6), 41\u201349 (2005)","journal-title":"IEEE Security and Privacy"},{"unstructured":"Staniford, S., Paxson, V., Weaver, N.: How to 0wn the Internet in Your Spare Time. In: Proc. of the Summer USENIX Conf., Berkeley, August 2002. USENIX (2002)","key":"13_CR19"},{"key":"13_CR20","volume-title":"Proc. of RAID","author":"K. Wang","year":"2005","unstructured":"Wang, K., Cretu, G., Stolfo, S.J.: Anomalous payload-based worm detection and signature generation. In: Proc. of RAID. ACM Press, New York (2005)"},{"key":"13_CR21","volume-title":"Proc. of RAID","author":"K. Wang","year":"2004","unstructured":"Wang, K., Stolfo, S.J.: Anomalous payload-based network intrusion detection. In: Proc. of RAID, September 2004. ACM Press, New York (2004)"},{"key":"13_CR22","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1145\/1029618.1029628","volume-title":"Proc. of WORM","author":"N. Weaver","year":"2004","unstructured":"Weaver, N., Hamadeh, I., Kesidis, G., Paxson, V.: Preliminary results using scale-down to explore worm dynamics. In: Proc. of WORM, pp. 65\u201372. ACM Press, New York (2004)"},{"doi-asserted-by":"crossref","unstructured":"White, B., et al.: An integrated experimental environment for distributed systems and networks. In: OSDI, Boston, December 2002, pp. 255\u2013270. USENIX (2002)","key":"13_CR23","DOI":"10.1145\/1060289.1060313"},{"key":"13_CR24","first-page":"190","volume-title":"Proc. of the CCS","author":"C.C. Zou","year":"2003","unstructured":"Zou, C.C., Gao, L., Gong, W., Towsley, D.: Monitoring and early warning for internet worms. In: Proc. of the CCS, pp. 190\u2013199. ACM Press, New York (2003)"}],"container-title":["Lecture Notes in Computer Science","Recent Advances in Intrusion Detection"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-87403-4_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,19]],"date-time":"2023-05-19T23:56:43Z","timestamp":1684540603000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-87403-4_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540874027","9783540874034"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-87403-4_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}