메뉴 건너뛰기




Volumn , Issue , 2004, Pages 43-53

A behavioral approach to worm detection

Author keywords

Behavioral Signatures; Descendant Relation; Intrusion Detection; Network Application Architecture; Network Worms

Indexed keywords

CODES (SYMBOLS); COMPUTER ARCHITECTURE; LOCAL AREA NETWORKS; ROUTERS; SECURITY OF DATA; SENSORS; SERVERS; TELECOMMUNICATION TRAFFIC;

EID: 14944379887     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1029618.1029625     Document Type: Conference Paper
Times cited : (83)

References (17)
  • 4
    • 0030644427 scopus 로고    scopus 로고
    • Filtering postures: Local enforcement for global policies
    • IEEE Computer Society Press. May
    • Joshua D. Guttman, Filtering Postures: Local Enforcement for Global Policies, Proceedings, 1997 IEEE Symposium on Security and Privacy pages 120-129. IEEE Computer Society Press. May 1997.
    • (1997) Proceedings, 1997 IEEE Symposium on Security and Privacy , pp. 120-129
    • Guttman, J.D.1
  • 5
    • 85084163246 scopus 로고    scopus 로고
    • Autograph: Toward automated, distributedworm signature detection
    • to appear
    • Hyang-Ah Kim, Brad Karp, Autograph: Toward Automated, DistributedWorm Signature Detection, USENIX Security Symposium, to appear, 2004.
    • (2004) USENIX Security Symposium
    • Kim, H.-A.1    Karp, B.2
  • 9
    • 84860099249 scopus 로고    scopus 로고
    • http://www.snort.org/.
  • 10
    • 14944372651 scopus 로고    scopus 로고
    • The design of GrIDS: A graph-based intrusion detection system
    • January
    • Stuart Staniford et al., The Design of GrIDS: A Graph-Based Intrusion Detection System. UCD Technical Report CSE-99-2, January, 1999.
    • (1999) UCD Technical Report , vol.CSE-99-2
    • Staniford, S.1
  • 12
    • 14844308379 scopus 로고    scopus 로고
    • Containment of scanning worms in enterprise networks
    • to appear
    • Stuart Staniford. Containment of Scanning Worms in Enterprise Networks. Journal of Computer Security, to appear, 2004.
    • (2004) Journal of Computer Security
    • Staniford, S.1
  • 13
    • 0003428414 scopus 로고
    • Addison Wesley Longman, Inc.
    • Richard W. Stevens, TCP/IP Illustrated, vol. 1, Addison Wesley Longman, Inc., 1994.
    • (1994) TCP/IP Illustrated , vol.1
    • Stevens, R.W.1
  • 15
    • 14844288427 scopus 로고    scopus 로고
    • Worms vs. Perimeters: The case for HardLANs
    • To appear, Stanford University, August
    • Nicholas Weaver, Dan Ellis, Vern Paxson, Stuart Staniford, Worms vs. Perimeters: The Case for HardLANs, To appear, Hot Interconnects 2004, Stanford University, August, 2004.
    • (2004) Hot Interconnects 2004
    • Weaver, N.1    Ellis, D.2    Paxson, V.3    Staniford, S.4
  • 17
    • 84948951525 scopus 로고    scopus 로고
    • Throttling viruses: Restricting propagation to defeat mobile malicious code
    • Matthew Williamson. Throttling Viruses: Restricting Propagation to Defeat Mobile Malicious Code. In ACSAC, 2002.
    • (2002) ACSAC
    • Williamson, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.