메뉴 건너뛰기




Volumn , Issue , 2006, Pages 17-24

Profiling self-propagating worms via behavioral footprinting

Author keywords

Behavioral footprinting; Content signature; Worm profiling; Worms

Indexed keywords

BEHAVIORAL FOOTPRINTING; CONTENT SIGNATURE; WORM PROFILING;

EID: 34547155109     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1179542.1179547     Document Type: Conference Paper
Times cited : (12)

References (27)
  • 1
    • 84858094932 scopus 로고    scopus 로고
    • Snort, http://www.snort.org.
    • Snort1
  • 2
    • 84858100507 scopus 로고    scopus 로고
    • Lion Worms, http://www.sans.org/y2k/lion.htm, 2001.
    • (2001)
    • Worms, L.1
  • 3
    • 34547154436 scopus 로고    scopus 로고
    • MSBlaster Worms. http://www.cert, org/advisories /CA-2003-20.html, 2003.
    • MSBlaster Worms. http://www.cert, org/advisories /CA-2003-20.html, 2003.
  • 4
    • 84858095297 scopus 로고    scopus 로고
    • Sasser Worms, http://www.microsoft.com/security/incident/sasser. asp, 2004.
    • (2004)
    • Worms, S.1
  • 12
    • 85084164812 scopus 로고    scopus 로고
    • X. Jiang and D. Xu. Collapsar: A VM-Based Architecture for Network Attack Detention Center. Proceedings of the 13th USENIX Security Symposium, Aug. 2004.
    • X. Jiang and D. Xu. Collapsar: A VM-Based Architecture for Network Attack Detention Center. Proceedings of the 13th USENIX Security Symposium, Aug. 2004.
  • 13
    • 33845567241 scopus 로고    scopus 로고
    • Behavioral Footprinting: A. New Dimension to Characterize Self-Propagating Worms
    • 05-027, Purdue University, Jan
    • X. Jiang and D. Xu. Behavioral Footprinting: a. New Dimension to Characterize Self-Propagating Worms. Department of Computer Science Technical Report CSD TR 05-027, Purdue University, Jan. 2005.
    • (2005) Department of Computer Science Technical Report CSD TR
    • Jiang, X.1    Xu, D.2
  • 20
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software
    • Feb
    • J. Newsome and D. Song. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. Proceedings of NDSS 2005, Feb. 2005.
    • (2005) Proceedings of NDSS 2005
    • Newsome, J.1    Song, D.2
  • 21
    • 21644473822 scopus 로고    scopus 로고
    • A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors)
    • Dec
    • M. Rinard, C. Cadar, D. Dumitran, D. Roy, and T. Leu. A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors). Proceedings of ACSAC, Dec. 2004.
    • (2004) Proceedings of ACSAC
    • Rinard, M.1    Cadar, C.2    Dumitran, D.3    Roy, D.4    Leu, T.5
  • 23
    • 14944372651 scopus 로고    scopus 로고
    • The Design of GrIDS: A Graph-Based Intrusion Detection System
    • CSE-99-2, Jan
    • S. Stamford and et al. The Design of GrIDS: A Graph-Based Intrusion Detection System. UCD Technical Report CSE-99-2, Jan. 1999.
    • (1999) UCD Technical Report
    • Stamford, S.1    and et, al.2
  • 26
    • 27544510809 scopus 로고    scopus 로고
    • Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits
    • Sept
    • H. J. Wang, C. Guo, D. R. Simon, and A. Zugenmaier. Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits. Proceedings of ACM SIGCOMM 2004, Sept. 2004.
    • (2004) Proceedings of ACM SIGCOMM 2004
    • Wang, H.J.1    Guo, C.2    Simon, D.R.3    Zugenmaier, A.4
  • 27
    • 30344438592 scopus 로고    scopus 로고
    • Anomalous Payload-based Network Intrusion Detection
    • Sept
    • K. Wang and S. J. Stolfo. Anomalous Payload-based Network Intrusion Detection. Proceedings of RAID 2004, Sept. 2004.
    • (2004) Proceedings of RAID 2004
    • Wang, K.1    Stolfo, S.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.