메뉴 건너뛰기




Volumn , Issue , 2005, Pages 242-256

Worm origin identification using random moonwalks

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK DEFENCES; RANDOM MOONWALKS; WORM ATTACK; WORM ORIGIN IDENTIFICATION;

EID: 27544495684     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2005.23     Document Type: Conference Paper
Times cited : (96)

References (29)
  • 3
    • 8744281125 scopus 로고    scopus 로고
    • CERT Advisory CA-2003-20
    • CERT Advisory CA-2003-20: W32/Blaster worm. http://www.cert.org/ advisories/CA-2003-20.html, 2003.
    • (2003) W32/Blaster Worm
  • 8
    • 84861258853 scopus 로고    scopus 로고
    • The Dragnet Project. http://www.cs.cmu.edu/~dragnet.
  • 12
  • 13
    • 33646048960 scopus 로고    scopus 로고
    • Honeycomb - Creating intrusion detection signatures using honeypots
    • C. Kreibich and J. Crowcroft. Honeycomb - Creating Intrusion Detection Signatures Using Honeypots. In Proc. of ACM HotNets-II, 2003.
    • (2003) Proc. of ACM HotNets-II
    • Kreibich, C.1    Crowcroft, J.2
  • 17
    • 85084164413 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • V. Paxson. Bro: A System for Detecting Network Intruders in Real-Time. In Proc. of 7th USENIX Security Symposium, 1998.
    • (1998) Proc. of 7th USENIX Security Symposium
    • Paxson, V.1
  • 22
    • 27544500273 scopus 로고    scopus 로고
    • Public review of 'toward a framework for internet forensic analysis'
    • A. Snoeren. Public review of 'Toward a Framework for internet Forensic Analysis'. In Proc. ACM HotNets-III, 2004.
    • (2004) Proc. ACM HotNets-III
    • Snoeren, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.