메뉴 건너뛰기




Volumn 4219 LNCS, Issue , 2006, Pages 81-105

Paragraph: Thwarting signature learning by training maliciously

Author keywords

Automatic signature generation; Machine learning; Spam; Worm

Indexed keywords

COMPUTER CRIME; COMPUTER VIRUSES; INTERNET; LEARNING SYSTEMS; TELECOMMUNICATION TRAFFIC;

EID: 33750332606     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11856214_5     Document Type: Conference Paper
Times cited : (151)

References (25)
  • 3
    • 84885679117 scopus 로고    scopus 로고
    • Vigilante: End-to-end containment of internet worms
    • Manuel Costa, Jon Crowcroft, Miguel Castro, and Antony Rowstron. Vigilante: End-to-end containment of internet worms. In SOSP, 2005.
    • (2005) SOSP
    • Costa, M.1    Crowcroft, J.2    Castro, M.3    Rowstron, A.4
  • 4
    • 33750355107 scopus 로고    scopus 로고
    • Minos: Architectural support for software security through control data integrity
    • December
    • Jedidiah R. Crandall and Fred Chong. Minos: Architectural support for software security through control data integrity. In International Symposium on Microarchitecture, December 2004.
    • (2004) International Symposium on Microarchitecture
    • Crandall, J.R.1    Chong, F.2
  • 7
    • 85084163246 scopus 로고    scopus 로고
    • Autograph: Toward automated, distributed worm signature detection
    • August
    • Hyang-Ah Kim and Brad Karp. Autograph: toward automated, distributed worm signature detection. In 13th USENIX Security Symposium, August 2004.
    • (2004) 13th USENIX Security Symposium
    • Kim, H.-A.1    Karp, B.2
  • 8
    • 33646048960 scopus 로고    scopus 로고
    • Honeycomb - Creating intrusion detection signatures using honeypots
    • November
    • Christian Kreibich and Jon Crowcroft. Honeycomb - creating intrusion detection signatures using honeypots. In HotNets, November 2003.
    • (2003) HotNets
    • Kreibich, C.1    Crowcroft, J.2
  • 9
    • 33751064824 scopus 로고    scopus 로고
    • Hamsa: Fast signature generation for zero-day polymorphic worms with provable attack resilience
    • May
    • Zhichun Li, Manan Sanghi, Yan Chen, Ming-Yang Kao, and Brian Chavez. Hamsa: fast signature generation for zero-day polymorphic worms with provable attack resilience. In IEEE Symposium on Security and Privacy, May 2006.
    • (2006) IEEE Symposium on Security and Privacy
    • Li, Z.1    Sanghi, M.2    Chen, Y.3    Kao, M.-Y.4    Chavez, B.5
  • 11
    • 34250091945 scopus 로고
    • Learning quickly when irrelevant attributes abound: A new linear threshold algorithm
    • N. Littlestone. Learning quickly when irrelevant attributes abound: A new linear threshold algorithm. Machine Learning, 2(285-318), 1988.
    • (1988) Machine Learning , vol.2 , Issue.285-318
    • Littlestone, N.1
  • 12
    • 0000511449 scopus 로고
    • Redundant noisy attributes, attribute errors, and linear-threshold learning using winnow
    • N. Littlestone. Redundant noisy attributes, attribute errors, and linear-threshold learning using winnow. In Fourth Annual Workshop on Computational Learning Theory, pages 147-156, 1991.
    • (1991) Fourth Annual Workshop on Computational Learning Theory , pp. 147-156
    • Littlestone, N.1
  • 16
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • February
    • James Newsome and Dawn Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In 12th Annual Network and Distributed System Security Symposium (NDSS), February 2005.
    • (2005) 12th Annual Network and Distributed System Security Symposium (NDSS)
    • Newsome, J.1    Song, D.2
  • 17
    • 33750330136 scopus 로고    scopus 로고
    • Delusive (definition)
    • Oxford University Press
    • delusive (definition). In Oxford English Dictionary, Oxford University Press, 2006.
    • (2006) Oxford English Dictionary
  • 19
    • 33751040191 scopus 로고    scopus 로고
    • Yann Ramin. ATPhttpd. http://www.redshift.com/~yramin/atp/atphttpd/.
    • ATPhttpd
    • Ramin, Y.1
  • 23
    • 12844267418 scopus 로고    scopus 로고
    • Secure program execution via dynamic information flow tracking
    • G. Edward Suh, Jaewook Lee, and Srinivas Devadas. Secure program execution via dynamic information flow tracking. In ASPLOS, 2004.
    • (2004) ASPLOS
    • Suh, G.E.1    Lee, J.2    Devadas, S.3
  • 24
    • 25844462447 scopus 로고    scopus 로고
    • Defending against internet worms: A signature-based approach
    • March
    • Yong Tang and Shigang Chen. Defending against internet worms: A signature-based approach. In IEEE INFOCOM, March 2005.
    • (2005) IEEE INFOCOM
    • Tang, Y.1    Chen, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.