메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 169-176

Polymorphic worm detection and defense: System design, experimental methodology, and data resources

Author keywords

Intrusion detection system; Network anomaly detection; Polymorphic worms; Worm signature extraction

Indexed keywords

INTRUSION DETECTION SYSTEM; NETWORK ANOMALY DETECTION; POLYMORPHIC WORMS; WORM SIGNATURE EXTRACTION;

EID: 34248403361     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1162666.1162676     Document Type: Conference Paper
Times cited : (14)

References (19)
  • 3
    • 14944346102 scopus 로고    scopus 로고
    • Automatically inferring patterns of resource consumption in network traffic
    • C. Estan, S. Savage, and G. Varghese. Automatically inferring patterns of resource consumption in network traffic. In Proc. ACM SIGCOMM, 2003.
    • (2003) Proc. ACM SIGCOMM
    • Estan, C.1    Savage, S.2    Varghese, G.3
  • 5
    • 0001532207 scopus 로고
    • Color set size problem with applications to string matching
    • L. Hui. Color set size problem with applications to string matching. In Proc. Symp. Comb. Pattern Matching, 1992.
    • (1992) Proc. Symp. Comb. Pattern Matching
    • Hui, L.1
  • 6
    • 85084163246 scopus 로고    scopus 로고
    • Autograph: Toward automated, distributed worm signature detection
    • H.A. Kim and B. Karp. Autograph: toward automated, distributed worm signature detection. In Proc. USENIX Security Symp., 2004.
    • (2004) Proc. USENIX Security Symp
    • Kim, H.A.1    Karp, B.2
  • 7
  • 9
    • 0016942292 scopus 로고
    • A space-economical suffix tree construction algorithm
    • E.M. McCreight. A space-economical suffix tree construction algorithm. In Journal of the ACM, 23(2):262-272, 1976.
    • (1976) Journal of the ACM , vol.23 , Issue.2 , pp. 262-272
    • McCreight, E.M.1
  • 10
    • 0042474173 scopus 로고    scopus 로고
    • Internet quarantine: Requirements for containing self-propagation code
    • D. Moore, C. Shannon, G. Voelker, and S. Savage. Internet quarantine: requirements for containing self-propagation code. In IEEE Proc. INFOCOM, 2003.
    • (2003) IEEE Proc. INFOCOM
    • Moore, D.1    Shannon, C.2    Voelker, G.3    Savage, S.4
  • 12
    • 0003676885 scopus 로고
    • Fingerprinting by random polynomials
    • Technical Report TR-15-81, Harvard University
    • M.O. Rabin. Fingerprinting by random polynomials, Technical Report TR-15-81, Harvard University, 1981.
    • (1981)
    • Rabin, M.O.1
  • 13
    • 44049107617 scopus 로고    scopus 로고
    • The strength of syntax based approaches to dynamic network intrusion detection
    • Princeton, NJ, Mar
    • W. Scheirer and M. Chuah. The strength of syntax based approaches to dynamic network intrusion detection. In Proc. Conf. on Info. Sci. & Sys., Princeton, NJ, Mar. 2006.
    • (2006) Proc. Conf. on Info. Sci. & Sys
    • Scheirer, W.1    Chuah, M.2
  • 15
    • 34248371093 scopus 로고    scopus 로고
    • Waikato Applied Network Dynamics Research Group, data traces
    • Waikato Applied Network Dynamics Research Group. Auckland University data traces. http://wand.cs.waikato.ac.nz/wand/wits/.
    • Auckland University
  • 16
    • 34248387180 scopus 로고    scopus 로고
    • Efficient Mining of the Multidimensional Traffic Cluster Hierarchy for Digesting, Visualization, and Anomaly Identification
    • To appear in
    • J. Wang, D.J. Miller, and G. Kesidis. Efficient Mining of the Multidimensional Traffic Cluster Hierarchy for Digesting, Visualization, and Anomaly Identification. To appear in IEEE JSAC on High-Speed Network Security, 2005.
    • (2005) IEEE JSAC on High-Speed Network Security
    • Wang, J.1    Miller, D.J.2    Kesidis, G.3
  • 18
    • 33645792808 scopus 로고    scopus 로고
    • Profiling internet backbone traffic: Behavior models and applications
    • K. Xu, Z. Zhang and S. Bhattacharyya. Profiling internet backbone traffic: behavior models and applications. In Proc. ACM SIGCOMM, 2005.
    • (2005) Proc. ACM SIGCOMM
    • Xu, K.1    Zhang, Z.2    Bhattacharyya, S.3
  • 19
    • 14944356227 scopus 로고    scopus 로고
    • Online identification of hierarchical heavy hitters: Algorithms, evaluation, and applications
    • Y. Zhang, S. Singh, S. Sen, N. Duffield, and C. Lund. Online identification of hierarchical heavy hitters: algorithms, evaluation, and applications. In Proc. Internet Meas. Conf., 2004.
    • (2004) Proc. Internet Meas. Conf
    • Zhang, Y.1    Singh, S.2    Sen, S.3    Duffield, N.4    Lund, C.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.