메뉴 건너뛰기




Volumn , Issue , 2006, Pages 65-72

Signature metrics for accurate and automated worm detection

Author keywords

Network worms; Traffic analysis; Worm signatures

Indexed keywords

NETWORK WORMS; TRAFFIC ANALYSIS; WORM SIGNATURES;

EID: 34547232533     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1179542.1179557     Document Type: Conference Paper
Times cited : (3)

References (22)
  • 1
    • 84888747323 scopus 로고    scopus 로고
    • Inktomi web search faq. Technical report. http://support.inktomi.com/ Search-Engine/Product.Info/FAQ/searchfaq.html#slurp.
    • Inktomi web search faq. Technical report. http://support.inktomi.com/ Search-Engine/Product.Info/FAQ/searchfaq.html#slurp.
  • 2
    • 84888656589 scopus 로고    scopus 로고
    • Worm:win32/zotob.a
    • Malicious software encyclopedia:, Technical report
    • Malicious software encyclopedia: Worm:win32/zotob.a. Technical report, http://www.microsoft.com/security/incident/zotob.mspx.
  • 3
    • 84888709283 scopus 로고    scopus 로고
    • The spread of the witty worm, caida
    • Technical report
    • The spread of the witty worm, caida. Technical report. http://www.caida.org/analysis/security/witty.
  • 10
    • 85084163246 scopus 로고    scopus 로고
    • Toward automated, distributed worm. signature detection
    • San Diego, CA, August
    • H. A. Kim and B. Karp. Toward automated, distributed worm. signature detection. In Proceedings of Usenix Security, San Diego, CA, August 2004.
    • (2004) Proceedings of Usenix Security
    • Kim, H.A.1    Karp, B.2
  • 12
    • 33646048960 scopus 로고    scopus 로고
    • Honeycomb-creating intrusion detection signatures using honeypots
    • November
    • C. Kreibich and J. Crowcroft. Honeycomb-creating intrusion detection signatures using honeypots. In Proceedings of ACM HotNets-II, November 2003.
    • (2003) Proceedings of ACM HotNets-II
    • Kreibich, C.1    Crowcroft, J.2
  • 15
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proceedings of NDSS 12, 2005.
    • (2005) Proceedings of NDSS 12
    • Newsome, J.1    Song, D.2
  • 16
    • 85090433665 scopus 로고    scopus 로고
    • Snort: Lightweight intrusion detection for networks
    • M. Roesch. Snort: Lightweight intrusion detection for networks. In Proceedings of Usenix LISA, 1999.
    • (1999) Proceedings of Usenix LISA
    • Roesch, M.1
  • 21
    • 84944731126 scopus 로고    scopus 로고
    • Design, implementation and test of an email virus throttle
    • M. Williamson. Design, implementation and test of an email virus throttle. In Proceedings of ACSAC 19, 2003.
    • (2003) Proceedings of ACSAC 19
    • Williamson, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.