메뉴 건너뛰기




Volumn , Issue , 2006, Pages 25-32

Exploiting temporal consistency to reduce false positives in host-based, collaborative detection of worms

Author keywords

Collaborative detection; HIDS; Host based intrusion detection; IDS; Native API; Peers; System calls; System services; Temporal consistency; Win32; Windows; Worms

Indexed keywords

COLLABORATIVE DETECTION; HOST-BASED INTRUSION DETECTION; SYSTEM CALLS; SYSTEM SERVICES; TEMPORAL CONSISTENCY; WIN32;

EID: 34547367531     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1179542.1179548     Document Type: Conference Paper
Times cited : (8)

References (49)
  • 1
    • 34547362209 scopus 로고    scopus 로고
    • AMD's Virtualization Solutions
    • Advanced Micro Devices, Inc, /us-en/Solutions/Consolidation/virtualization.aspx
    • Advanced Micro Devices, Inc. AMD's Virtualization Solutions, enterprise. amd.com/us-en/Solutions/Consolidation/virtualization.aspx.
  • 6
    • 14944379887 scopus 로고    scopus 로고
    • D. R. Ellis, J. G. Aiken, K. S. Attwood, and S. D. Tenaglia. A Behavioral Approach to Worm Wetection. In Proc. of the 2004 ACM Workshop on Rapid Malcode, pages 43-53, New York, NY, USA, 2004. ACM Press.
    • D. R. Ellis, J. G. Aiken, K. S. Attwood, and S. D. Tenaglia. A Behavioral Approach to Worm Wetection. In Proc. of the 2004 ACM Workshop on Rapid Malcode, pages 43-53, New York, NY, USA, 2004. ACM Press.
  • 9
    • 34547371166 scopus 로고    scopus 로고
    • Orisoft Inc
    • Orisoft Inc. www.grisoft.com.
  • 12
    • 34547308731 scopus 로고    scopus 로고
    • J. Harris. YAC: Yet Another Caller ID Program. sunflowerhead.com/ software/yac/.
    • J. Harris. YAC: Yet Another Caller ID Program. sunflowerhead.com/ software/yac/.
  • 19
    • 85084163246 scopus 로고    scopus 로고
    • Autograph: Toward Automated, Distributed Worm Signature Detection
    • H. Kim and B. Karp. Autograph: Toward Automated, Distributed Worm Signature Detection. In USENIX Security Symposium, pages 271-286, 2004.
    • (2004) USENIX Security Symposium , pp. 271-286
    • Kim, H.1    Karp, B.2
  • 21
    • 31844455702 scopus 로고    scopus 로고
    • Host-Based Detection of Worms through Peer-to-Peer Cooperation
    • New York, NY, USA, ACM Press
    • D. J. Malan and M. D. Smith. Host-Based Detection of Worms through Peer-to-Peer Cooperation. In Proc. of the 2005 A CM Workshop on Rapid Malcode, New York, NY, USA, 2005. ACM Press.
    • (2005) Proc. of the 2005 A CM Workshop on Rapid Malcode
    • Malan, D.J.1    Smith, M.D.2
  • 22
    • 34547338308 scopus 로고    scopus 로고
    • McAfee, Inc
    • McAfee, Inc. www.mcafee.com.
  • 25
    • 31844453661 scopus 로고    scopus 로고
    • Polygraph: Automatically Generating Signatures For Polymorphic Worms
    • J. Newsome, B. Karp, and D. Song. Polygraph: Automatically Generating Signatures For Polymorphic Worms. In USENIX Security Symposium, 2005.
    • (2005) USENIX Security Symposium
    • Newsome, J.1    Karp, B.2    Song, D.3
  • 26
    • 34547239293 scopus 로고    scopus 로고
    • PC World Communications, Inc
    • PC World Communications, Inc. WorldBench 5. www.worldbench.com.
    • WorldBench , vol.5
  • 27
    • 31844439615 scopus 로고    scopus 로고
    • Poking Around Under the Hood: A Programmer's View of Windows NT 4.0
    • August
    • M. Pietrek. Poking Around Under the Hood: A Programmer's View of Windows NT 4.0. Microsoft Systems Journal, August 1996. www.microsoft.com/msj/ archive/s413.aspx.
    • (1996) Microsoft Systems Journal
    • Pietrek, M.1
  • 28
    • 34547353440 scopus 로고    scopus 로고
    • The Metasploit Project. Windows System Call Table (NT/2000/XP/2003). www.metasploit.com/users/opcode/syscalls.html.
    • The Metasploit Project. Windows System Call Table (NT/2000/XP/2003). www.metasploit.com/users/opcode/syscalls.html.
  • 29
    • 84878346861 scopus 로고    scopus 로고
    • Improving Host Security with System Call Policies
    • N. Provos. Improving Host Security with System Call Policies. In USENIX Security Symposium, pages 257-272, 2003.
    • (2003) USENIX Security Symposium , pp. 257-272
    • Provos, N.1
  • 31
    • 34547371165 scopus 로고    scopus 로고
    • P. Roberts. Mydoom Sets Speed Records. www.pcworld.com/news/article/0, aid,114461,00.asp.
    • P. Roberts. Mydoom Sets Speed Records. www.pcworld.com/news/article/0, aid,114461,00.asp.
  • 33
    • 34547266374 scopus 로고    scopus 로고
    • T. Sabin. Personal correspondence
    • T. Sabin. Personal correspondence.
  • 34
    • 31844436472 scopus 로고    scopus 로고
    • T. Sabin. Strace for NT. www.bindview.com/Services/ RAZOR/Utilities/ Windows/strace-readme.cfm.
    • Strace for NT
    • Sabin, T.1
  • 35
    • 34547258611 scopus 로고    scopus 로고
    • Sana Security, Inc
    • Sana Security, Inc. www.sanasecurity.com.
  • 43
    • 27144475340 scopus 로고    scopus 로고
    • S. J. Stolfo, F. Apap, E. Eskin, K. Heller, S. Hershkop, A. Honig, and K. Svore. A Comparative Evaluation of Two Algorithms for Windows Registry Anomaly Detection, 13 of Journal of Computer Security, pages 659-693. 2005.
    • S. J. Stolfo, F. Apap, E. Eskin, K. Heller, S. Hershkop, A. Honig, and K. Svore. A Comparative Evaluation of Two Algorithms for Windows Registry Anomaly Detection, volume 13 of Journal of Computer Security, pages 659-693. 2005.
  • 44
    • 34547288903 scopus 로고    scopus 로고
    • Symantec Corporation
    • Symantec Corporation, www.symantec.com.
  • 47
    • 34547244678 scopus 로고    scopus 로고
    • UserLand Software, Inc. XML-RPC Home Page.
    • UserLand Software, Inc. XML-RPC Home Page. www.xmlrpc.com.
  • 49
    • 4243483478 scopus 로고    scopus 로고
    • Throttling Viruses: Restricting propagation to defeat malicious mobile code
    • Technical Report HPL-2002-172R1, HP Labs, December
    • M. M. Williamson. Throttling Viruses: Restricting propagation to defeat malicious mobile code. Technical Report HPL-2002-172R1, HP Labs, December 2002.
    • (2002)
    • Williamson, M.M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.