메뉴 건너뛰기




Volumn 51, Issue 5, 2007, Pages 1256-1274

SweetBait: Zero-hour worm detection and containment using low- and high-interaction honeypots

Author keywords

Emulators; Honeypots; Intrusion detection prevention; Security

Indexed keywords

COMPUTER VIRUSES; COMPUTER WORMS; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; INTERNET; SECURITY SYSTEMS; TELECOMMUNICATION TRAFFIC;

EID: 33846251940     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2006.09.005     Document Type: Article
Times cited : (47)

References (53)
  • 1
    • 85084162258 scopus 로고    scopus 로고
    • S. Staniford, V. Paxson, N. Weaver, How to own the internet in your spare time, in: Proc. of the 11th USENIX Security Symposium, 2002.
  • 3
    • 33846228285 scopus 로고    scopus 로고
    • Cisco, Cisco secure intrusion detection system, version 2.2.0, User guide (netranger), 2003.
  • 4
    • 33846250740 scopus 로고    scopus 로고
    • N. Provos, A virtual honeypot framework, CITI, Technical Report 03-1, 2003.
  • 5
    • 33846219418 scopus 로고    scopus 로고
    • M. Costa, J. Crowcroft, M. Castro, A. Rowstron, Can we contain internet worms? in: Third Workshop on Hot Topics in Networks (HOTNETS-III), San Diego, CA, November 2004.
  • 6
    • 33846227378 scopus 로고    scopus 로고
    • D. Dagon, X. Qin, G. Gu, W. Lee, J. Grizzard, J. Levin, H. Owen, HoneyStat: Local worm detection using honeypots, in: Proc. of RAID2004, Sophia Antipolis, France, September 2004.
  • 7
    • 33645791274 scopus 로고    scopus 로고
    • Honeycomb - creating intrusion detection signatures using honeypots
    • Kreibich C., and Crowcroft J. Honeycomb - creating intrusion detection signatures using honeypots. ACM SIGCOMM Computer Communication Review 34 1 (2004) 51-56
    • (2004) ACM SIGCOMM Computer Communication Review , vol.34 , Issue.1 , pp. 51-56
    • Kreibich, C.1    Crowcroft, J.2
  • 8
    • 84885679117 scopus 로고    scopus 로고
    • M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, P. Barham, Vigilante: End-to-end containment of internet worms, in: SOSP'05, Brighton, UK, October 2005.
  • 9
    • 33846220169 scopus 로고    scopus 로고
    • H. Bos, K. Huang, Towards software-based signature detection for intrusion prevention on the network card, in: Proc. of Eighth International Symposium on Recent Advances in Intrusion Detection (RAID2005), Seattle, WA, September 2005 [Online] .
  • 10
    • 33846263337 scopus 로고    scopus 로고
    • J. Newsome, D. Song, Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software, in: Proc. of the 12th Annual Network and Distributed System Security Symposium (NDSS), 2005.
  • 11
    • 10944236904 scopus 로고    scopus 로고
    • Using honeynets to protect large enterprise networks
    • November/December
    • Levine J., Grizzard J., and Owen H. Using honeynets to protect large enterprise networks. IEEE Security and Privacy 2 6 (2004) 73-75 November/December
    • (2004) IEEE Security and Privacy , vol.2 , Issue.6 , pp. 73-75
    • Levine, J.1    Grizzard, J.2    Owen, H.3
  • 12
    • 85084164812 scopus 로고    scopus 로고
    • Collapsar: A vm-based architecture for network attack detention center
    • USENIX
    • Jiang X., and Xu D. Collapsar: A vm-based architecture for network attack detention center. USENIX Security Symposium (2004), USENIX 15-28
    • (2004) USENIX Security Symposium , pp. 15-28
    • Jiang, X.1    Xu, D.2
  • 13
    • 85084163190 scopus 로고    scopus 로고
    • N. Provos, A virtual honeypot framework, in: 13th USENIX Security Symposium, San Diego, CA, August 2004.
  • 14
    • 33846212614 scopus 로고    scopus 로고
    • N. Vanderavero, X. Brouckaert, O. Bonaventure, B.L. Charlier, The honeytank: a scalable approach to collect malicious Internet traffic, in: Proc. of IISW04, December 2004.
  • 15
    • 15944399365 scopus 로고    scopus 로고
    • M. Dornseif, T. Holz, C. Klein, Nosebreak - attacking honeynets, in: Proc. of the 5th Annual IEEE Information Assurance Workshop, 2004 [Online] .
  • 16
    • 33846244947 scopus 로고    scopus 로고
    • O. Arkin, F. Yarochkin, Xprobe v2.0: A "fuzzy" approach to remote active operating systems fingerprinting, August 2002 .
  • 17
    • 33846194121 scopus 로고    scopus 로고
    • F. Yarochkin, Remote OS Detection via TCP/IP Stack Fingerprinting, October 1998 .
  • 18
    • 33846188840 scopus 로고    scopus 로고
    • G. Portokalidis, A. Slowinska, H. Bos, Argos: an emulator for fingerprinting zero-day attacks, in: Proc. ACM SIGOPS EUROSYS'2006, Leuven, Belgium, April 2006.
  • 19
    • 85063636742 scopus 로고    scopus 로고
    • F. Bellard, Qemu, a fast and portable dynamic translator, in: USENIX 2005 Annual Technical Conference, FREENIX Track, Anaheim, CA, April 2005, pp. 41-46.
  • 20
    • 85090433665 scopus 로고    scopus 로고
    • M. Roesch, Snort lightweight intrusion detection for networks, in: Proc. of USENIX LISA '99: 13th Systems Administration Conference, 1999.
  • 21
    • 33846259259 scopus 로고    scopus 로고
    • W. de Bruijn, A. Slowinska, K. van Reeuwijk, T. Hruby, L. Xu, H. Bos, Safecard: a gigabit IPS on the network card, in: Proc. of 9th International Symposium on Recent Advances in Intrusion Detection (RAID'06), Hamburg, Germany, September 2006.
  • 22
    • 0016518897 scopus 로고    scopus 로고
    • A.V. Aho, M.J. Corasick, Efficient string matching: An aid to bibliographic search, in: G. Manacher (Ed.), Communications of the ACM, vol. 18, June 1975.
  • 23
    • 2642562805 scopus 로고    scopus 로고
    • M. Dacier, F. Pouget, H. Debar, Honeypots: Practical means to validate malicious fault assumptions, in: 10th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2004), Papeete, Tahiti, March 2004.
  • 24
    • 33846230891 scopus 로고    scopus 로고
    • Symantec, "CodeRedII," August 2001 http://www.symantec.com/avcenter/venc/data/codered.ii.html.
  • 25
    • 0742276097 scopus 로고    scopus 로고
    • D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, N. Weaver, Inside the slammer worm, IEEE Security & Privacy, July/August 2003.
  • 26
    • 33846239251 scopus 로고    scopus 로고
    • Symantec, "w32.blaster.worm', August 2003 .
  • 27
    • 33846221819 scopus 로고    scopus 로고
    • CERT, CERT Advisory CA-2001-26 Nimda Worm, September 2001 .
  • 28
    • 33846261123 scopus 로고    scopus 로고
    • SecuriTeam, Veritas backup exec agent browser registration request exploit, January 2005 .
  • 29
    • 33846246983 scopus 로고    scopus 로고
    • K-Otik, Microsoft wins remote code execution exploit, December 2004 .
  • 30
    • 33846245859 scopus 로고    scopus 로고
    • Symantec, January 2004, W32.mydoom.a@mm, .
  • 31
    • 33846230452 scopus 로고    scopus 로고
    • Symantec, w32.sasser.worm, 2004 .
  • 32
    • 33846212613 scopus 로고    scopus 로고
    • M. Ligh, Attack signatures and internet traffic analysis, 2004 .
  • 33
    • 33846217311 scopus 로고    scopus 로고
    • M. Project, Metasploit Framework, .
  • 34
    • 0024122965 scopus 로고    scopus 로고
    • S.E. Smaha, Haystack: An intrusion detection system, in: IEEE Fourth Aerospace Computer Security Applications Conference, Orlando, FL, USA, December 1988.
  • 35
    • 33846236781 scopus 로고    scopus 로고
    • L. Oudot, Fighting internet worms with honeypots, October 2003 .
  • 36
    • 33846200691 scopus 로고    scopus 로고
    • T. Liston, Welcome to my tarpit: the tactical and strategic use of LaBrea, 2001 .
  • 37
    • 33846256965 scopus 로고    scopus 로고
    • S.S. Service, A Walk Through "Sombria": a network surveillance system, July 2003 .
  • 38
    • 85084163246 scopus 로고    scopus 로고
    • H.-A. Kim, B. Karp, Autograph: toward automated, distributed worm signature detection, in: Proc. of the 13th USENIX Security Symposium, San Diego, CA, August 2004.
  • 39
    • 33846233306 scopus 로고    scopus 로고
    • N. Joukov, T. cker Chiueh, Internet worms as internet-wide threat, Experimental Computer Systems Lab, Technical Report TR-143, September 2003.
  • 40
    • 16344396406 scopus 로고    scopus 로고
    • C.C. Zou, L. Gao, W. Gong, D. Townsley, Monitoring and early warning for internet worms, in: Proc. of the 10th ACM Conference on Computer and Communication Security, 2003, pp. 190-199.
  • 41
    • 33846261881 scopus 로고    scopus 로고
    • S. Singh, C. Estan, G. Varghese, S. Savage, The EarlyBird system for real-time detection of unknown worms, in: Operating System Design and Implementation (OSDI), San Francisco, CA, December 2004.
  • 42
    • 33846245858 scopus 로고    scopus 로고
    • C. Clark, W. Lee, D. Schimmel, D. Contis, M. Koné, A. Thomas, A hardware platform for network intrusion detection and prevention, in: Third Workshop on Network Processors and Applications, Madrid, Spain, February 2004.
  • 43
    • 79961204066 scopus 로고    scopus 로고
    • H. Bos, W. de Bruijn, M. Cristea, T. Nguyen, G. Portokalidis, FFPF: fairly fast packet filters, in: Proc. of OSDI'04, San Francisco, CA, December 2004.
  • 44
    • 85084164480 scopus 로고    scopus 로고
    • N. Weaver, S. Staniford, V. Paxson, Very fast containment of scanning worms, in: 13th USENIX Security Symposium, San Diego, August 2004, pp. 29-44.
  • 45
    • 85178291347 scopus 로고    scopus 로고
    • K.G. Anagnostakis, M.B. Greenwald, S. Ioannidis, A.D. Keromytis, D. Li, A cooperative immunization system for an untrusting Internet, in: Proc. of the 11th IEEE International Conference on Networking (ICON), September/October 2003.
  • 46
    • 84944412883 scopus 로고    scopus 로고
    • S. Sidiroglou, A.D. Keromytis, A network worm vaccine architecture, in: 12th International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, June 2003.
  • 47
    • 33846220167 scopus 로고    scopus 로고
    • T. Toth, C. Kruegel, Connection-history based anomaly detection, in: Proc. of the IEEE Workshop on Information Assurance and Security, West Point, NY, June 2002 [Online]. .
  • 48
    • 33846201126 scopus 로고    scopus 로고
    • K. Wang, S.J. Stolfo, Anomalous payload-based network intrusion detection, in: Proc. of RAID2004, Sophia Antipolis, France, September 2004.
  • 49
    • 14844319067 scopus 로고    scopus 로고
    • C. Kruegel, G. Vigna, Anomaly detection of web-based attacks, in: Proc. of ACM CCS, Washington, DC, October 2003, pp. 251-261.
  • 50
    • 33846231724 scopus 로고    scopus 로고
    • S. Cheung, R. Crawford, M. Dilger, J. Frank, J. Hoagland, K. Levitt, J. Rowe, S. Staniford, R. Yip, D. Zerkle, The design of GrIDS: A graph-based intrusion detection system, UC Davis, Technical Report, CSE-99-2, January 1999.
  • 51
    • 84958977234 scopus 로고    scopus 로고
    • J.E. Just, J.C. Reynolds, L.A. Clough, M. Danforth, K.N. Levitt, R. Maglich, J. Rowe, Learning unknown attacks - a start, in: RAID, 2002, pp. 158-176.
  • 52
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • Paxson V. Bro: A system for detecting network intruders in real-time. ComputerNetworks 31 23-24 (1999) 2435-2463
    • (1999) ComputerNetworks , vol.31 , Issue.23-24 , pp. 2435-2463
    • Paxson, V.1
  • 53
    • 21644482450 scopus 로고    scopus 로고
    • J.R. Crandall, F.T. Chong, Minos: Control data attack prevention orthogonal to memory model, in: Proc. of the 37th annual International Symposium on Microarchitecture, 2004, pp. 221-232.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.