-
1
-
-
84858094932
-
-
Snort, http://www.snort.org.
-
-
-
Snort1
-
2
-
-
84858100507
-
-
Lion Worms, http://www.sans.org/y2k/lion.htm, 2001.
-
(2001)
-
-
Worms, L.1
-
3
-
-
34547154436
-
-
MSBlaster Worms. http://www.cert, org/advisories /CA-2003-20.html, 2003.
-
MSBlaster Worms. http://www.cert, org/advisories /CA-2003-20.html, 2003.
-
-
-
-
4
-
-
84858095297
-
-
Sasser Worms, http://www.microsoft.com/security/incident/sasser. asp, 2004.
-
(2004)
-
-
Worms, S.1
-
5
-
-
33751056900
-
Towards Automatic Generation of Vulnerability-Based Signatures
-
May
-
D. Brumley, J. Newsome, D. Song, H. Wang, and S. Jha. Towards Automatic Generation of Vulnerability-Based Signatures. Proceedings of the 27th IEEE Symposium on Security and Privacy, May 2006.
-
(2006)
Proceedings of the 27th IEEE Symposium on Security and Privacy
-
-
Brumley, D.1
Newsome, J.2
Song, D.3
Wang, H.4
Jha, S.5
-
6
-
-
84885679117
-
Vigilante: End-to-End Containment of Internet Worms
-
Oct
-
M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham. Vigilante: End-to-End Containment of Internet Worms. Proceedings of ACM SOSP 2005, Oct. 2005.
-
(2005)
Proceedings of ACM SOSP 2005
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
8
-
-
28044442580
-
HoneyStat: Local Worm Detection Using Honeypots
-
Sept
-
D. Dagon, X. Qin, G. Gu, W. Lee, J. Grizzard, J. Levine, and H. Owen. HoneyStat: Local Worm Detection Using Honeypots. Proceedings of RAID 2004, Sept. 2004.
-
(2004)
Proceedings of RAID 2004
-
-
Dagon, D.1
Qin, X.2
Gu, G.3
Lee, W.4
Grizzard, J.5
Levine, J.6
Owen, H.7
-
12
-
-
85084164812
-
-
X. Jiang and D. Xu. Collapsar: A VM-Based Architecture for Network Attack Detention Center. Proceedings of the 13th USENIX Security Symposium, Aug. 2004.
-
X. Jiang and D. Xu. Collapsar: A VM-Based Architecture for Network Attack Detention Center. Proceedings of the 13th USENIX Security Symposium, Aug. 2004.
-
-
-
-
13
-
-
33845567241
-
Behavioral Footprinting: A. New Dimension to Characterize Self-Propagating Worms
-
05-027, Purdue University, Jan
-
X. Jiang and D. Xu. Behavioral Footprinting: a. New Dimension to Characterize Self-Propagating Worms. Department of Computer Science Technical Report CSD TR 05-027, Purdue University, Jan. 2005.
-
(2005)
Department of Computer Science Technical Report CSD TR
-
-
Jiang, X.1
Xu, D.2
-
20
-
-
79953672829
-
Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software
-
Feb
-
J. Newsome and D. Song. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. Proceedings of NDSS 2005, Feb. 2005.
-
(2005)
Proceedings of NDSS 2005
-
-
Newsome, J.1
Song, D.2
-
21
-
-
21644473822
-
A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors)
-
Dec
-
M. Rinard, C. Cadar, D. Dumitran, D. Roy, and T. Leu. A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors). Proceedings of ACSAC, Dec. 2004.
-
(2004)
Proceedings of ACSAC
-
-
Rinard, M.1
Cadar, C.2
Dumitran, D.3
Roy, D.4
Leu, T.5
-
23
-
-
14944372651
-
The Design of GrIDS: A Graph-Based Intrusion Detection System
-
CSE-99-2, Jan
-
S. Stamford and et al. The Design of GrIDS: A Graph-Based Intrusion Detection System. UCD Technical Report CSE-99-2, Jan. 1999.
-
(1999)
UCD Technical Report
-
-
Stamford, S.1
and et, al.2
-
27
-
-
30344438592
-
Anomalous Payload-based Network Intrusion Detection
-
Sept
-
K. Wang and S. J. Stolfo. Anomalous Payload-based Network Intrusion Detection. Proceedings of RAID 2004, Sept. 2004.
-
(2004)
Proceedings of RAID 2004
-
-
Wang, K.1
Stolfo, S.J.2
|