메뉴 건너뛰기




Volumn , Issue , 2004, Pages 116-125

Using predators to combat worms and viruses: A simulation-based study

Author keywords

[No Author keywords available]

Indexed keywords

COMBAT WORMS; MALWARES; MEMORY ERRORS; PREDATORS; SELF-PROPAGATING ATTACKS;

EID: 21644434256     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSAC.2004.47     Document Type: Conference Paper
Times cited : (22)

References (32)
  • 2
    • 84862209017 scopus 로고    scopus 로고
    • Address obfuscation: An efficient approach to combat a broad range of memory error exploits
    • S. Bhatkar, D. C. DuVarney, and R. Sekar. Address obfuscation: an efficient approach to combat a broad range of memory error exploits. In USENIX Security Symposium, 2003.
    • (2003) USENIX Security Symposium
    • Bhatkar, S.1    DuVarney, D.C.2    Sekar, R.3
  • 5
    • 84860957337 scopus 로고    scopus 로고
    • Cert advisory ca-2001-22 w32/sircam malicious code
    • Cert advisory ca-2001-22 w32/sircam malicious code. http://www.cert.org/advisories/ca-2001-22.html.
  • 13
    • 0042474227 scopus 로고    scopus 로고
    • Modeling the spread of active worms
    • Z. Chen, L. Gao, and K. Kwait. Modeling the spread of active worms. In IEEE Infocom, 2003.
    • (2003) IEEE Infocom
    • Chen, Z.1    Gao, L.2    Kwait, K.3
  • 17
    • 21644479268 scopus 로고    scopus 로고
    • O'Reilly and Associates
    • R. Grimes. Malicious Code. O'Reilly and Associates, 2001.
    • (2001) Malicious Code
    • Grimes, R.1
  • 18
    • 29244471799 scopus 로고    scopus 로고
    • An approach for detecting self-propagating email using anomaly detection
    • A. Gupta and R. Sekar. An approach for detecting self-propagating email using anomaly detection. In Recent Advances in Intrusion Detection, 2003.
    • (2003) Recent Advances in Intrusion Detection
    • Gupta, A.1    Sekar, R.2
  • 20
    • 4243480214 scopus 로고    scopus 로고
    • On the use of intrusion technologies to distribute non-malicious programs to vulnerable computers
    • University of Aizu
    • A. Kara. On the use of intrusion technologies to distribute non-malicious programs to vulnerable computers. Technical report, University of Aizu, 2001.
    • (2001) Technical Report
    • Kara, A.1
  • 25
    • 26444511823 scopus 로고    scopus 로고
    • Countering network worms through automatch patch generation
    • Columbia University Department of Computer Science
    • S. Sidiroglu and A. D. Keromytis. Countering network worms through automatch patch generation. Technical Report 029-03, Columbia University Department of Computer Science, 2003.
    • (2003) Technical Report , vol.29 , Issue.3
    • Sidiroglu, S.1    Keromytis, A.D.2
  • 28
    • 0242456135 scopus 로고    scopus 로고
    • Predators: Good will mobile codes combat against computer viruses
    • H. Toyoizumi and A. Kara. Predators: Good will mobile codes combat against computer viruses. In New Security Paradigms Workshop, 2002.
    • (2002) New Security Paradigms Workshop
    • Toyoizumi, H.1    Kara, A.2
  • 29
    • 4544275741 scopus 로고    scopus 로고
    • Modeling the effects of timing parameters on virus propagation
    • Y. Wang and C. Wang. Modeling the effects of timing parameters on virus propagation. In ACM Workshop on Rapid Malcode, 2003.
    • (2003) ACM Workshop on Rapid Malcode
    • Wang, Y.1    Wang, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.