메뉴 건너뛰기




Volumn 34, Issue 4, 2004, Pages 193-204

Shield: Vulnerability-driven network filters for preventing known vulnerability exploits

Author keywords

Generic Protocol Analyzer; Network Filter; Patching; Vulnerability Signature; Worm Defense

Indexed keywords

COMPUTER SOFTWARE; COMPUTER WORMS; ENCODING (SYMBOLS); NETWORK PROTOCOLS; PROBLEM SOLVING; SECURITY OF DATA; TELECOMMUNICATION TRAFFIC;

EID: 21844456680     PISSN: 01464833     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1030194.1015489     Document Type: Conference Paper
Times cited : (106)

References (49)
  • 2
    • 12144276864 scopus 로고    scopus 로고
    • Timing the application of security patches for optimal uptime
    • November
    • Steve Beattie, Seth Arnold, Crispin Cowan, Perry Wagle, and Chris Wright. Timing the application of security patches for optimal uptime. In LISA XVI, November 2002.
    • (2002) LISA XVI
    • Beattie, S.1    Arnold, S.2    Cowan, C.3    Wagle, P.4    Wright, C.5
  • 4
    • 21844455349 scopus 로고    scopus 로고
    • Byacc. http://dickey.his.com/byacc/byacc.html.
  • 7
    • 21844434512 scopus 로고    scopus 로고
    • November
    • Microsoft Security Bulletin MS01-033, November 2003. http://www. microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/ MS01-033.asp.
    • (2003) Microsoft Security Bulletin MS01-033
  • 8
    • 21844458763 scopus 로고    scopus 로고
    • Microsoft Corp. URLScan Security Tool.http://www.microsoft.com/technet/ security/URLScan.asp.
    • URLScan Security Tool
  • 14
    • 85084160972 scopus 로고    scopus 로고
    • Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
    • August
    • Mark Handley, Vern Paxson, and Christian Kreibich. Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics. In Proceedings of USENIX Security Symposium, August 2001.
    • (2001) Proceedings of USENIX Security Symposium
    • Handley, M.1    Paxson, V.2    Kreibich, C.3
  • 15
    • 0036948858 scopus 로고    scopus 로고
    • A transport layer approach for achieving aggregate bandwidths on multi-homed mobile hosts
    • September
    • Hung-Yun Hsieh and Raghupathy Sivakumar. A transport layer approach for achieving aggregate bandwidths on multi-homed mobile hosts. In ACM Mobicom, September 2002.
    • (2002) ACM Mobicom
    • Hsieh, H.-Y.1    Sivakumar, R.2
  • 18
    • 33646048960 scopus 로고    scopus 로고
    • Honeycomb: Creating intrusion detection signatures using honeypots
    • C. Kreibich and J. Crowcroft. Honeycomb: Creating Intrusion Detection Signatures Using Honeypots. In HotNets-II, 2003.
    • (2003) HotNets-II
    • Kreibich, C.1    Crowcroft, J.2
  • 21
    • 2642524006 scopus 로고    scopus 로고
    • PacketTypes: Abstract specification of network protocol messages
    • P. J. McCann and S. Chandra. PacketTypes: Abstract Specification of Network Protocol Messages. In Proceedings of ACM SIGCOMM, 2000.
    • (2000) Proceedings of ACM SIGCOMM
    • McCann, P.J.1    Chandra, S.2
  • 24
    • 2342553315 scopus 로고    scopus 로고
    • September
    • Microsoft Security Bulletin MS03-026, September 2003. http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/ bulletin/MS03-026.asp.
    • (2003) Microsoft Security Bulletin MS03-026
  • 27
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • Dec
    • Vern Paxson. Bro: A System for Detecting Network Intruders in Real-Time. In Computer Networks, Dec 1999.
    • (1999) Computer Networks
    • Paxson, V.1
  • 31
    • 8644246187 scopus 로고    scopus 로고
    • A virtual honeypot framework
    • Center for Information Technology Integration, University of Michigan, October
    • Niels Provos. A Virtual Honeypot Framework. Technical Report CITI-03-1, Center for Information Technology Integration, University of Michigan, October 2003.
    • (2003) Technical Report , vol.CITI-03-1
    • Provos, N.1
  • 35
    • 21844451704 scopus 로고    scopus 로고
    • April
    • W32.Sasser.Worm, April 2004. http://securityresponse.symantec.com/ avcenter/venc/data/w32.sasser.worm.html.
    • (2004) W32.Sasser.Worm
  • 39
    • 14844309952 scopus 로고    scopus 로고
    • The EarlyBird system for real-time detection of unknown worms
    • University of California at San Diego
    • Sumeet Singh, Cristian Estan, George Varghese, and Stefan Savage. The EarlyBird System for Real-time Detection of Unknown Worms. Technical Report CS2003-0761, University of California at San Diego, 2003.
    • (2003) Technical Report , vol.CS2003-0761
    • Singh, S.1    Estan, C.2    Varghese, G.3    Savage, S.4
  • 40
    • 21844439815 scopus 로고    scopus 로고
    • January
    • Microsoft security bulletin ms02-039, January 2003. http://www.microsoft. com/technet/treeview/default.asp?url=/technet/security/bulletin/MS02-039.asp.
    • (2003) Microsoft Security Bulletin Ms02-039
  • 44
    • 0002946830 scopus 로고    scopus 로고
    • A first step towards automated detection of buffer overrun vulnerabilities
    • David Wagner, Jeffrey S. Foster, Eric A. Brewer, and Alexander Aiken. A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities. In NDSS, 2000.
    • (2000) NDSS
    • Wagner, D.1    Foster, J.S.2    Brewer, E.A.3    Aiken, A.4
  • 48
    • 4243483478 scopus 로고    scopus 로고
    • Throttling viruses: Restricting propagation to defeat malicious mobile code
    • HP Labs Bristol
    • Matthew M. Williamson. Throttling viruses: Restricting propagation to defeat malicious mobile code. Technical Report HPL-2002-172, HP Labs Bristol, 2002.
    • (2002) Technical Report , vol.HPL-2002-172
    • Williamson, M.M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.