메뉴 건너뛰기




Volumn 5, Issue 3, 2006, Pages 186-199

A monitoring system for detecting repeated packets with applications to computer worms

Author keywords

Anomaly detection; Computer worms; Intrusion detection; Network security; Traffic monitoring

Indexed keywords


EID: 33745133346     PISSN: 16155262     EISSN: 16155270     Source Type: Journal    
DOI: 10.1007/s10207-006-0081-8     Document Type: Article
Times cited : (11)

References (63)
  • 1
    • 17744375238 scopus 로고    scopus 로고
    • Rocketfuel: An ISP topology mapping engine (2003)
    • [Accessed: August 2]
    • Anderson, T., Mahajan, R., Spring, N., Wetherall, D.: Rocketfuel: An ISP topology mapping engine (2003). http://www.cs.washington.edu/research/ networking/rocketfuel/ [Accessed: August 2, 2003]
    • (2003)
    • Anderson, T.1    Mahajan, R.2    Spring, N.3    Wetherall, D.4
  • 4
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • Bloom, B.: Space/time trade-offs in hash coding with allowable errors. Commun. ACM 13 (17), 422-426 (1970)
    • (1970) Commun. ACM , vol.13 , Issue.17 , pp. 422-426
    • Bloom, B.1
  • 5
    • 0036605072 scopus 로고    scopus 로고
    • On the number of overflown urns and excess balls in an allocation model with limited urn capacity
    • Boutsikas, M., Koutras, M.: On the number of overflown urns and excess balls in an allocation model with limited urn capacity. Stat. Plan. Inference 104, 259-286 (2002)
    • (2002) Stat. Plan. Inference , vol.104 , pp. 259-286
    • Boutsikas, M.1    Koutras, M.2
  • 7
    • 70450232823 scopus 로고    scopus 로고
    • Network applications of Bloom filters: A survey
    • Broder, A., Mitzenmacher, M.: Network applications of Bloom filters: A survey. Internet Math. 1 (4), 485-509 (2003-2004)
    • (2003) Internet Math , vol.1 , Issue.4 , pp. 485-509
    • Broder, A.1    Mitzenmacher, M.2
  • 9
    • 22944492300 scopus 로고    scopus 로고
    • Detecting early worm propagation through packet matching
    • Tech. Rep ISI-TR-2004-585, University of Southern California
    • Chen, X., Heidemann, J.: Detecting early worm propagation through packet matching. Tech. Rep. ISI-TR-2004-585, University of Southern California (2004)
    • (2004)
    • Chen, X.1    Heidemann, J.2
  • 17
    • 0034206002 scopus 로고    scopus 로고
    • Summary cache: A scalable wide-area Web cache sharing protocol
    • Fan, L., Cao, P., Almeida, J., Broder, A.: Summary cache: A scalable wide-area Web cache sharing protocol. IEEE/ACM Trans. Netw. 8 (3), 281-293 (2000)
    • (2000) IEEE/ACM Trans. Netw. , vol.8 , Issue.3 , pp. 281-293
    • Fan, L.1    Cao, P.2    Almeida, J.3    Broder, A.4
  • 19
    • 8644229619 scopus 로고    scopus 로고
    • The art of port scanning
    • Fyodor: URL: [Accessed: March 6, 2003]
    • Fyodor: The art of port scanning. Phrack Mag. 7 (51)H(1997). URL: http://www.phrack.org [Accessed: March 6, 2003]
    • (1997) Phrack Mag , vol.7 , Issue.51
  • 21
    • 33244488406 scopus 로고    scopus 로고
    • Secure indexes
    • Cryptology ePrint Archive, Report 2003/216 URL: [Accessed: January 7, 2004]
    • Goh, E.J.: Secure indexes. Cryptology ePrint Archive, Report 2003/216 (2003). URL: http://eprint.iacr.org/2003/216/ [Accessed: January 7, 2004]
    • (2003)
    • Goh, E.J.1
  • 22
    • 84945300922 scopus 로고    scopus 로고
    • Comparative analysis of the hardware implementations of hash functions SHA-1 and SHA-512
    • Proceedings of Information Security Conference (ISC 2002) Springer, Sao Paulo, Brazil
    • Grembowski, T., Lien, R., Gaj, K., Nguyen, N., Bellows, P., Flidr, J., Lehman, T., Schott, B.: Comparative analysis of the hardware implementations of hash functions SHA-1 and SHA-512. In: Proceedings of Information Security Conference (ISC 2002), Lecture Notes in Computer Science, vol. 2433, pp. 75-89. Springer, Sao Paulo, Brazil (2002)
    • (2002) Lecture Notes in Computer Science , vol.2433 , pp. 75-89
    • Grembowski, T.1    Lien, R.2    Gaj, K.3    Nguyen, N.4    Bellows, P.5    Flidr, J.6    Lehman, T.7    Schott, B.8
  • 23
    • 85084160972 scopus 로고    scopus 로고
    • Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
    • Washington, DC
    • Handley, M., Kreibich, C., Paxson, V.: Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics. In: Proceedings of the 10th USENIX Security Symposium. Washington, DC (2001)
    • (2001) Proceedings of the 10th USENIX Security Symposium
    • Handley, M.1    Kreibich, C.2    Paxson, V.3
  • 24
    • 84959055142 scopus 로고    scopus 로고
    • Dynamic self-checking techniques for improved tamper resistance
    • Proceedings of the First ACM Workshop on Digital Rights Management (DRM 2001) Springer, Berlin Heidelberg New York
    • Horne, B., Matheson, L., Sheehan, C., Tarjan, R.: Dynamic self-checking techniques for improved tamper resistance. In: Proceedings of the First ACM Workshop on Digital Rights Management (DRM 2001), Lecture Notes in Computer Science, vol. 2320, pp. 141-159. Springer, Berlin Heidelberg New York (2002)
    • (2002) Lecture Notes in Computer Science , vol.2320 , pp. 141-159
    • Horne, B.1    Matheson, L.2    Sheehan, C.3    Tarjan, R.4
  • 25
    • 0000709793 scopus 로고
    • Negative association of random variables, with applications
    • Joag-Dev, K., Proschan, F.: Negative association of random variables, with applications. Ann. Stat. 11 (1), 286-295 (1983)
    • (1983) Ann. Stat. , vol.11 , Issue.1 , pp. 286-295
    • Joag-Dev, K.1    Proschan, F.2
  • 27
    • 85084163246 scopus 로고    scopus 로고
    • Autograph: Toward automated, distributed worm signature detection
    • San Diego, CA
    • Kim, H.A., Karp, B.: Autograph: Toward automated, distributed worm signature detection. In: Proceedings of 13th USENIX Security Symposium. San Diego, CA (2004)
    • (2004) Proceedings of 13th USENIX Security Symposium
    • Kim, H.A.1    Karp, B.2
  • 28
    • 3543118019 scopus 로고    scopus 로고
    • Space-code Bloom filter for efficient traffic flow measurement
    • Miami Beach, FL
    • Kumar, A., Xu, J., Li, L., Wang, J.: Space-code Bloom filter for efficient traffic flow measurement. In: Proceedings of IMC. Miami Beach, FL (2003)
    • (2003) Proceedings of IMC
    • Kumar, A.1    Xu, J.2    Li, L.3    Wang, J.4
  • 29
    • 17444431614 scopus 로고    scopus 로고
    • Worm propagation and generic attacks
    • Levy, E.: Worm propagation and generic attacks. IEEE Secur. Priv. 3 (2), 63-65 (2005)
    • (2005) IEEE Secur. Priv. , vol.3 , Issue.2 , pp. 63-65
    • Levy, E.1
  • 30
    • 33745119080 scopus 로고    scopus 로고
    • Modeling of security and systems. A network worm modeling package for SSFNet (2003)
    • [Accessed: September 10]
    • Liljenstam, M.: Modeling of security and systems. A network worm modeling package for SSFNet (2003). http://www.crhc.uiuc.edu/mili/ research/ssf/worm/ [Accessed: September 10, 2004]
    • (2004)
    • Liljenstam, M.1
  • 32
    • 26444534457 scopus 로고    scopus 로고
    • Mitigating network denial-of-service through diversity-based traffic management
    • Proceedings of the 3rd Annual Conference on Applied Cryptography and Network Security (ACNS 2005), Springer, New York
    • Matrawy, A., van Oorschot, P., Somayaji, A.: Mitigating network denial-of-service through diversity-based traffic management. In: Proceedings of the 3rd Annual Conference on Applied Cryptography and Network Security (ACNS 2005), Lecture Notes in Computer Science, vol. 3531, pp. 104-121. Springer, New York (2005)
    • (2005) Lecture Notes in Computer Science , vol.3531 , pp. 104-121
    • Matrawy, A.1    van Oorschot, P.2    Somayaji, A.3
  • 33
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
    • McHugh, J.: Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Trans. Inf. Syst. Secur. (TISSEC) 3 (4), 262-294 (2000)
    • (2000) ACM Trans. Inf. Syst. Secur. (TISSEC) , vol.3 , Issue.4 , pp. 262-294
    • McHugh, J.1
  • 34
    • 33745145023 scopus 로고    scopus 로고
    • DARPA intrusion detection evaluation: Data sets (1999)
    • MIT Lincoln Laboratory: [Accessed: April 1]
    • MIT Lincoln Laboratory: DARPA intrusion detection evaluation: Data sets (1999). http://www.ll.mit.edu/IST/ideval/data/data_index.html [Accessed: April 1, 2004]
    • (2004)
  • 37
    • 0030736223 scopus 로고    scopus 로고
    • Computer virus-antivirus coevolution
    • Nachenberg, C.: Computer virus-antivirus coevolution. Commun. ACM 40 (1), 46-51 (1997)
    • (1997) Commun. ACM , vol.40 , Issue.1 , pp. 46-51
    • Nachenberg, C.1
  • 38
    • 84957663269 scopus 로고    scopus 로고
    • Software performance of universal hash functions
    • Prague, Czech Republic
    • Nevelsteen, W., Preneel, B.: Software performance of universal hash functions. In: Proceedings of Eurocrypt'99, pp. 24-41. Prague, Czech Republic (1999)
    • (1999) Proceedings of Eurocrypt'99 , pp. 24-41
    • Nevelsteen, W.1    Preneel, B.2
  • 40
    • 0003403663 scopus 로고    scopus 로고
    • The network simulator - NS-2 (2003)
    • NS-2: [Accessed: September 10]
    • NS-2: The network simulator - NS-2 (2003). http://www.isi.edu/nsnam/ns/ [Accessed: September 10, 2003]
    • (2003)
  • 42
    • 33745151490 scopus 로고    scopus 로고
    • Opnet modeler (2003)
    • OPNET Technologies Inc.: [Accessed: September 10]
    • OPNET Technologies Inc.: Opnet modeler (2003). http://www.opnet.com [Accessed: September 10, 2003]
    • (2003)
  • 43
    • 0001083965 scopus 로고    scopus 로고
    • On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets
    • San Diego, CA
    • Park, K., Lee, H.: On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets. In: Proceedings of the Special Interest Group on Data Communication (SIGCOMM'01). San Diego, CA (2001)
    • (2001) Proceedings of the Special Interest Group on Data Communication (SIGCOMM'01)
    • Park, K.1    Lee, H.2
  • 44
    • 0004145058 scopus 로고    scopus 로고
    • Insertion, evasion and denial of service: Eluding network intrusion detection
    • Tech. rep., Secure Networks, Inc. [Accessed: November 6, 2005]
    • Ptacek, T.H., Newsham, T.N.: Insertion, evasion and denial of service: Eluding network intrusion detection. Tech. rep., Secure Networks, Inc. (1998). http://www.aciri.org/vern/Ptacek-Newsham-Evasion-98.ps [Accessed: November 6, 2005]
    • (1998)
    • Ptacek, T.H.1    Newsham, T.N.2
  • 45
    • 0003676885 scopus 로고
    • Fingerprinting by random polynomials
    • Technical Report TR-15-81, Center for Research in Computing Technology, Harvard University, Cambridge, MA
    • Rabin, M.: Fingerprinting by random polynomials. Technical Report TR-15-81, Center for Research in Computing Technology, Harvard University, Cambridge, MA (1981)
    • (1981)
    • Rabin, M.1
  • 47
    • 24344486810 scopus 로고    scopus 로고
    • The spread of the Witty worm (2004)
    • [Accessed: June 18]
    • Shannon, C., Moore, D.: The spread of the Witty worm (2004). http://www.caida.org/analysis/security/witty/ [Accessed: June 18, 2004]
    • (2004)
    • Shannon, C.1    Moore, D.2
  • 48
    • 14844309952 scopus 로고    scopus 로고
    • The EarlyBird system for real-time detection of unknown worms
    • Technical Report CS2003-0761, University of California, San Diego, CA
    • Singh, S., Estan, C., Varghese, G., Savage, S.: The EarlyBird system for real-time detection of unknown worms. Technical Report CS2003-0761, University of California, San Diego, CA (2003)
    • (2003)
    • Singh, S.1    Estan, C.2    Varghese, G.3    Savage, S.4
  • 52
    • 67650540414 scopus 로고    scopus 로고
    • Scalable simulation framework network models (2003)
    • SSFNet: [Accessed: September 10]
    • SSFNet: Scalable simulation framework network models (2003). http://www.ssfnet.org/homePage.html [Accessed: September 10, 2003]
    • (2003)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.