메뉴 건너뛰기




Volumn , Issue , 2005, Pages 30-40

Defending against hitlist worms using network address space randomization

Author keywords

Internet Worms; Network Security; Randomization; Traffic Analysis

Indexed keywords

COMPUTER NETWORKS; INTERNET; RANDOM PROCESSES; SECURITY OF DATA; TELECOMMUNICATION TRAFFIC;

EID: 31844445856     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1103626.1103633     Document Type: Conference Paper
Times cited : (68)

References (53)
  • 3
    • 31844437754 scopus 로고    scopus 로고
    • NLANR-PMA Traffic Archive: Bell Labs-I trace. http://pma.nlanr.net/ Traces/Traces/long/bell/1, 2002.
    • Bell Labs-I Trace
  • 4
    • 31844447832 scopus 로고    scopus 로고
    • NLANR-PMA Traffic Archive: Leipzig-I trace. http.//pma.nlanr.net/Traces/ Traces/long/leip/1, 2002.
    • Leipzig-I Trace
  • 6
    • 31844442326 scopus 로고    scopus 로고
    • Fingerprinting: The complete documentation. http://www.10t3k.org/ security/docs/fingerprinting/, 2004.
    • The Complete Documentation
  • 7
    • 31844443973 scopus 로고    scopus 로고
    • Fingerprinting: The complete toolsbox. http://www.10t3k.org/security/ tools/fingerprinting/, 2004.
    • The Complete Toolsbox
  • 9
    • 31844454612 scopus 로고    scopus 로고
    • THC-Amap. http://thc.org/releases.php, 2004.
    • (2004) THC-Amap
  • 15
    • 84862209017 scopus 로고    scopus 로고
    • Address obfuscation: An efficient approach to combat a broad range of memory error exploits
    • Aug.
    • S. Bhatkar, D. DuVarney, and R. Sekar. Address obfuscation: An efficient approach to combat a broad range of memory error exploits. In In Proceedings of the 12th USENIX Security Symposium, pages 105-120, Aug. 2003.
    • (2003) In Proceedings of the 12th USENIX Security Symposium , pp. 105-120
    • Bhatkar, S.1    DuVarney, D.2    Sekar, R.3
  • 18
    • 0004881443 scopus 로고
    • Bootstrap protocol (BOOTP)
    • Sept.
    • B. Croft and J. Gilmore. Bootstrap Protocol (BOOTP). RFC 951, http://www.rfc-editor.org/, Sept. 1985.
    • (1985) RFC , vol.951
    • Croft, B.1    Gilmore, J.2
  • 19
    • 0003290981 scopus 로고    scopus 로고
    • Dynamic host configuration protocol
    • Mar.
    • R. Droms. Dynamic Host Configuration Protocol. RFC 2131, http://www.rfc-editor.org/, Mar. 1997.
    • (1997) RFC , vol.2131
    • Droms, R.1
  • 20
  • 21
    • 0342770299 scopus 로고
    • The design and implementation of a mobile internetworking architecture
    • J. Ioannidis and G. Q. Maguire Jr. The design and implementation of a mobile internetworking architecture. In USENIX Winter, pages 489-502, 1993.
    • (1993) USENIX Winter , pp. 489-502
    • Ioannidis, J.1    Maguire Jr., G.Q.2
  • 29
    • 31844455887 scopus 로고    scopus 로고
    • Final report for the network security mechanisms utilizing network address translation LDRD project
    • Sandia National Laboratories, November
    • J. Michalski, C. Price, E. Stanton, E. L. Chua, K. Seah, W. Y. Heng, and T. C. Pheng. Final Report for the Network Security Mechanisms Utilizing Network Address Translation LDRD Project. Technical Report SAND2002-3613, Sandia National Laboratories, November 2002.
    • (2002) Technical Report , vol.SAND2002-3613
    • Michalski, J.1    Price, C.2    Stanton, E.3    Chua, E.L.4    Seah, K.5    Heng, W.Y.6    Pheng, T.C.7
  • 40
    • 14844308379 scopus 로고    scopus 로고
    • Containment of scanning worms in enterprise networks
    • S. Staniford. Containment of Scanning Worms in Enterprise Networks. Journal of Computer Security, 2004.
    • (2004) Journal of Computer Security
    • Staniford, S.1
  • 44
    • 21844456680 scopus 로고    scopus 로고
    • Shield: Vulnerability-driven network filters for preventing known vulnerability exploits
    • H. J. Wang, C. Guo, D. R. Simon, and A. Zugenmaier. Shield: vulnerability-driven network filters for preventing known vulnerability exploits. In Proceedings of ACM SIGCOMM'04, pages 193-204, 2004.
    • (2004) Proceedings of ACM SIGCOMM'04 , pp. 193-204
    • Wang, H.J.1    Guo, C.2    Simon, D.R.3    Zugenmaier, A.4
  • 48
    • 4243483478 scopus 로고    scopus 로고
    • Throttling viruses: Restricting propagation to defeat malicious mobile code
    • HP Laboratories Bristol
    • M. Williamson. Throttling Viruses: Restricting Propagation to Defeat Malicious Mobile Code. Technical Report HPL-2002-172, HP Laboratories Bristol, 2002.
    • (2002) Technical Report , vol.HPL-2002-172
    • Williamson, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.