메뉴 건너뛰기




Volumn 4219 LNCS, Issue , 2006, Pages 226-248

Anagram: A content anomaly detector resistant to mimicry attack

Author keywords

[No Author keywords available]

Indexed keywords

CORRELATION METHODS; DETECTORS; FEEDBACK; MATHEMATICAL MODELS; SENSORS;

EID: 33750335757     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11856214_12     Document Type: Conference Paper
Times cited : (196)

References (39)
  • 1
    • 33750343827 scopus 로고    scopus 로고
    • Advanced polymorphic worms: Evading IDS by blending in with normal traffic
    • Vancouver, BC, Canada
    • Kolesnikov, O., D. Dagon, and W. Lee, Advanced Polymorphic Worms: Evading IDS by Blending in with Normal Traffic, in USENIX Security Symposium. 2006: Vancouver, BC, Canada.
    • (2006) USENIX Security Symposium
    • Kolesnikov, O.1    Dagon, D.2    Lee, W.3
  • 2
    • 0042474173 scopus 로고    scopus 로고
    • Internet quarantine: Requirements for containing self-propagating code
    • Moore, D., et al. Internet Quarantine: Requirements for Containing Self-Propagating Code, in INFOCOM. 2003.
    • (2003) INFOCOM
    • Moore, D.1
  • 4
    • 84924223669 scopus 로고    scopus 로고
    • Static analysis of executables to detect malicious patterns
    • Washington, D.C.
    • Christodorescu, M. and S. Jha. Static Analysis of Executables to Detect Malicious Patterns, in USENIX Security Symposium. 2003. Washington, D.C.
    • (2003) USENIX Security Symposium
    • Christodorescu, M.1    Jha, S.2
  • 5
  • 6
    • 33746389292 scopus 로고    scopus 로고
    • Polymorphic worm detection using structural information of executables
    • Seattle, WA
    • Kruegel, C., et al. Polymorphic Worm Detection Using Structural Information of Executables, in Symposium on Recent Advances in Intrusion Detection. 2005. Seattle, WA.
    • (2005) Symposium on Recent Advances in Intrusion Detection
    • Kruegel, C.1
  • 7
    • 0038011179 scopus 로고    scopus 로고
    • Specification-based anomaly detection: A new approach for detecting network intrusions
    • Washington, D.C.
    • Sekar, R., et al. Specification-based Anomaly Detection: A New Approach for Detecting Network Intrusions, in ACM Conference on Computer and Communications Security. 2002. Washington, D.C.
    • (2002) ACM Conference on Computer and Communications Security
    • Sekar, R.1
  • 8
    • 0036038437 scopus 로고    scopus 로고
    • Service specific anomaly detection for network intrusion detection
    • Madrid, Spain
    • Kruegel, C., T. Toth, and E. Kirda. Service Specific Anomaly Detection for Network Intrusion Detection, in Symposium on Applied Computing (SAC). 2002. Madrid, Spain.
    • (2002) Symposium on Applied Computing (SAC)
    • Kruegel, C.1    Toth, T.2    Kirda, E.3
  • 9
    • 85027555608 scopus 로고    scopus 로고
    • SigFree: A signature-free buffer overflow attack blocker
    • Boston, MA
    • Wang, X., et al. SigFree: A Signature-free Buffer Overflow Attack Blocker, in USENIX Security. 2006. Boston, MA.
    • (2006) USENIX Security
    • Wang, X.1
  • 12
    • 84941159825 scopus 로고    scopus 로고
    • [cited 2006 April 4]
    • SourceFire Inc. Snort rulesets. 2006 [cited 2006 April 4]; Available from: http://www.snort.org/pub-bin/downloads.cgi.
    • (2006) Snort Rulesets
  • 13
    • 33745673185 scopus 로고    scopus 로고
    • Application communities: Using monoculture for dependability
    • Locasto, M.E., S. Sidiroglou, and A.D. Keromytis. Application Communities: Using Monoculture for Dependability, in HotDep. 2005.
    • (2005) HotDep
    • Locasto, M.E.1    Sidiroglou, S.2    Keromytis, A.D.3
  • 15
    • 0034593307 scopus 로고    scopus 로고
    • Characterizing the behavior of a program using multiple-length N-grams
    • Cork, Ireland
    • Marceau, C. Characterizing the Behavior of a Program Using Multiple-Length N-grams. in New Security Paradigms Workshop. 2000. Cork, Ireland.
    • (2000) New Security Paradigms Workshop
    • Marceau, C.1
  • 17
    • 0036085540 scopus 로고    scopus 로고
    • Why 6? Defining the operational limits of slide, an anomaly-based intrusion detector
    • Berkeley, CA
    • Tan, K.M.C. and R.A. Maxion. Why 6? Defining the Operational Limits of slide, an Anomaly-Based Intrusion Detector, in IEEE Symposium on Security and Privacy. 2002. Berkeley, CA.
    • (2002) IEEE Symposium on Security and Privacy
    • Tan, K.M.C.1    Maxion, R.A.2
  • 18
    • 33745788387 scopus 로고    scopus 로고
    • On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
    • Alexandria, VA
    • Crandall, J.R., et al. On Deriving Unknown Vulnerabilities from Zero-Day Polymorphic and Metamorphic Worm Exploits, in ACM Conference on Computer and Communications Security. 2005. Alexandria, VA.
    • (2005) ACM Conference on Computer and Communications Security
    • Crandall, J.R.1
  • 19
    • 27544498978 scopus 로고    scopus 로고
    • Polygraph: Automatically generating signatures for polymorphic worms
    • Oakland, CA
    • Newsome, J., B. Karp, and D. Song. Polygraph: Automatically Generating Signatures. for Polymorphic Worms, in IEEE Security and Privacy. 2005. Oakland, CA.
    • (2005) IEEE Security and Privacy
    • Newsome, J.1    Karp, B.2    Song, D.3
  • 21
    • 0014814325 scopus 로고
    • Space/time trade-offs in Hash coding with allowable errors
    • Bloom, B.H., Space/time trade-offs in Hash Coding with Allowable Errors. Communications of the ACM, 1970.13(7): p. 422-426.
    • (1970) Communications of the ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.H.1
  • 22
    • 0024867751 scopus 로고
    • Universal one-way Hash functions and their cryptographic applications
    • Seattle, WA
    • Naor, M. and M. Yung. Universal One-Way Hash Functions and their Cryptographic Applications, in ACM Symposium on Theory of Computing. 1989. Seattle, WA.
    • (1989) ACM Symposium on Theory of Computing
    • Naor, M.1    Yung, M.2
  • 25
    • 33845989821 scopus 로고    scopus 로고
    • Can machine learning be secure?
    • Barreno, M., et al. Can Machine Learning Be Secure? in ASIACCS. 2006.
    • (2006) ASIACCS
    • Barreno, M.1
  • 26
    • 85084160243 scopus 로고    scopus 로고
    • StackGuard: Automatic adaptive detection and prevention of bufferOverflow attacks
    • San Antonio, TX
    • Cowan, C., et al. StackGuard: Automatic Adaptive Detection and Prevention of BufferOverflow Attacks, in USENIX Security Symposium. 1998. San Antonio, TX.
    • (1998) USENIX Security Symposium
    • Cowan, C.1
  • 27
    • 84906497159 scopus 로고    scopus 로고
    • Building a reactive immune system for software services
    • Anaheim, CA
    • Sidiroglou, S., et al. Building a Reactive Immune System for Software Services, in USENIX. 2005. Anaheim, CA.
    • (2005) USENIX
    • Sidiroglou, S.1
  • 31
    • 33646048960 scopus 로고    scopus 로고
    • Honeycomb - Creating intrusion detection signatures using honeypots
    • Boston, MA
    • Kreibich, C. and J. Crowcroft. Honeycomb - Creating Intrusion Detection Signatures Using Honeypots. in ACM Workshop on Hot Topics in Networks. 2003. Boston, MA.
    • (2003) ACM Workshop on Hot Topics in Networks
    • Kreibich, C.1    Crowcroft, J.2
  • 32
    • 4544295719 scopus 로고    scopus 로고
    • The earlyBird system for real-time detection of unknown worms
    • Boston, MA
    • Singh, S., et al. The EarlyBird System for Real-Time Detection of Unknown Worms, in ACM Workshop on Hot Topics in Networks. 2003. Boston, MA.
    • (2003) ACM Workshop on Hot Topics in Networks
    • Singh, S.1
  • 33
    • 85084163246 scopus 로고    scopus 로고
    • Autograph: Toward automated, distributed worm signature detection
    • San Diego, CA
    • Kim, H.-A. and B. Karp. Autograph: Toward Automated, Distributed Worm Signature Detection, in USENIX Security Symposium. 2004. San Diego, CA.
    • (2004) USENIX Security Symposium
    • Kim, H.-A.1    Karp, B.2
  • 34
    • 33750352075 scopus 로고    scopus 로고
    • Shield: Vulnerability-driven network filters for preventing known vulnerability exploits
    • Wang, HJ., et al. Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits. in ACM SIGCOMM. 2004.
    • (2004) ACM SIGCOMM
    • Wang, H.J.1
  • 35
    • 33745800070 scopus 로고    scopus 로고
    • Fast and automated generation of attack signatures: A basis for building self-protecing servers
    • Alexandria, VA
    • Liang, Z. and R. Sekar. Fast and Automated Generation of Attack Signatures: A Basis for Building Self-Protecing Servers, in ACM Conference on Computer and Communications Security. 2005. Alexandria, VA.
    • (2005) ACM Conference on Computer and Communications Security
    • Liang, Z.1    Sekar, R.2
  • 36
    • 84888375990 scopus 로고    scopus 로고
    • [cited 2006 March 29]
    • K2. ADMmutate. 2001 [cited 2006 March 29]; Available from: http://www.ktwo.ca/security.html.
    • (2001) ADMmutate
  • 37
    • 0034836394 scopus 로고    scopus 로고
    • Intrusion detection via static analysis
    • Oakland, CA
    • Wagner, D. and D. Dean. Intrusion Detection via Static Analysis, in IEEE Security and Privacy. 2001. Oakland, CA.
    • (2001) IEEE Security and Privacy
    • Wagner, D.1    Dean, D.2
  • 38
    • 0038011184 scopus 로고    scopus 로고
    • Mimicry attacks on host-based intrusion detection systems
    • Wagner, D. and P. Soto. Mimicry Attacks on Host-Based Intrusion Detection Systems. in ACM CCS. 2002.
    • (2002) ACM CCS
    • Wagner, D.1    Soto, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.