메뉴 건너뛰기




Volumn 3224, Issue , 2004, Pages 82-101

Detecting unknown massive mailing viruses using proactive methods

Author keywords

Intrusion detection; Malicious executable detection; Virus detection

Indexed keywords

COMPUTER VIRUSES; MERCURY (METAL); VIRUSES;

EID: 35048880908     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-30143-1_5     Document Type: Article
Times cited : (1)

References (56)
  • 2
    • 0023294949 scopus 로고
    • Computer Viruses: Theory and Experiments
    • Cohen, F.: Computer Viruses: Theory and Experiments. Computers and Security 6 (1987) 22-35
    • (1987) Computers and Security , vol.6 , pp. 22-35
    • Cohen, F.1
  • 9
    • 0030092390 scopus 로고    scopus 로고
    • Checking for Race Conditions in File Accesses
    • Bishop, M., Dilger, M.: Checking for Race Conditions in File Accesses. Computing Systems 9 (1996) 131-152
    • (1996) Computing Systems , vol.9 , pp. 131-152
    • Bishop, M.1    Dilger, M.2
  • 10
    • 0030216542 scopus 로고    scopus 로고
    • Neural Networks for Computer Virus Recognition
    • Tesauro, G., Kephart, J., Sorkin, G.: Neural Networks for Computer Virus Recognition. IEEE Expert 11 (1996) 5-6
    • (1996) IEEE Expert , vol.11 , pp. 5-6
    • Tesauro, G.1    Kephart, J.2    Sorkin, G.3
  • 12
    • 0004200684 scopus 로고
    • Computer Security Technology Planning Study
    • ESD-TR-73-51, U.S. Air Force Electronic Systems Division, Deputy for Command and Management Systems, HQ Electronic Systems Division (AFSC), Bedford, Massachusetts
    • Anderson, J.P.: Computer Security Technology Planning Study. Technical report, ESD-TR-73-51, U.S. Air Force Electronic Systems Division, Deputy for Command and Management Systems, HQ Electronic Systems Division (AFSC), Bedford, Massachusetts (1972)
    • (1972) Technical Report
    • Anderson, J.P.1
  • 14
    • 3543139162 scopus 로고    scopus 로고
    • Computability Classes for Enforcement Mechanisms
    • Cornell University, Dept. of Computer Science
    • Hamlen, K.W., Morrisett, G., Schneider, F.B.: Computability Classes for Enforcement Mechanisms. Technical report, TR 2003-1908, Cornell University, Dept. of Computer Science (2003)
    • (2003) Technical Report , vol.TR 2003-1908
    • Hamlen, K.W.1    Morrisett, G.2    Schneider, F.B.3
  • 19
    • 85084161234 scopus 로고    scopus 로고
    • MAPbox: Using Parameterized Behavior Classes to Confine Untrusted Application
    • Denver, Colorado
    • Acharya, A., Raje, M.: MAPbox: Using Parameterized Behavior Classes to Confine Untrusted Application. In: Proceedings of the 9th USENIX Security Symposium, Denver, Colorado (2000)
    • (2000) Proceedings of the 9th USENIX Security Symposium
    • Acharya, A.1    Raje, M.2
  • 21
    • 84878346861 scopus 로고    scopus 로고
    • Improving Host Security with System Call Policies
    • Washington, DC
    • Provos, N.: Improving Host Security with System Call Policies. In: Proceedings of the 12th USENIX Security Symposium, Washington, DC (2003) 257-272
    • (2003) Proceedings of the 12th USENIX Security Symposium , pp. 257-272
    • Provos, N.1
  • 23
    • 35048861569 scopus 로고    scopus 로고
    • The Honeynet Project
    • The Honeynet Project: http://project.honeynet.org/.
  • 25
    • 85084164812 scopus 로고    scopus 로고
    • Collapsar: A VM-Based Architecture for Network Attack Detention Center
    • San Diego, California
    • Jiang, X., Xu, D.: Collapsar: A VM-Based Architecture for Network Attack Detention Center. In: Proceedings of the 13th USENIX Security Symposium, San Diego, California (2004)
    • (2004) Proceedings of the 13th USENIX Security Symposium
    • Jiang, X.1    Xu, D.2
  • 29
    • 35048860579 scopus 로고    scopus 로고
    • Next Generation Intrusion Prevention System
    • LaBrea Sentry IPS: Next Generation Intrusion Prevention System: http://www.labreatechnologies.com/.
    • Labrea Sentry, I.P.S.1
  • 33
    • 0004048154 scopus 로고
    • Computer Security Threat Monitoring and Surveillance
    • James P. Anderson Company, Fort Washington, Pennsylvania
    • Anderson, J.P.: Computer Security Threat Monitoring and Surveillance. Technical report, James P. Anderson Company, Fort Washington, Pennsylvania (1980)
    • (1980) Technical Report
    • Anderson, J.P.1
  • 35
    • 84873309550 scopus 로고
    • Penetration State Transition Analysis - A Rule-Based Intrusion Detection Approach
    • San Antonio, Texas
    • Porras, P.A., Kemmerer, R.A.: Penetration State Transition Analysis - A Rule-Based Intrusion Detection Approach. In: 8th Annual Computer Security Applications Conference, San Antonio, Texas (1992) 220-229
    • (1992) 8th Annual Computer Security Applications Conference , pp. 220-229
    • Porras, P.A.1    Kemmerer, R.A.2
  • 38
    • 0004118981 scopus 로고
    • The NIDES Statistical Component: Description and Justification
    • SRI International, Computer Science Laboratory, Menlo Park, California
    • Javitz, H.S., Valdes, A.: The NIDES Statistical Component: Description and Justification. Technical report, SRI International, Computer Science Laboratory, Menlo Park, California (1993)
    • (1993) Technical Report
    • Javitz, H.S.1    Valdes, A.2
  • 39
    • 0242667960 scopus 로고
    • Detecting Unusual Program Behavior Using the Statistical Components of NIDES
    • SRI-CSL-95-06, SRI International, Computer Science Laboratory, Menlo Park, California
    • Anderson, D., Lunt, T.F., Javitz, H., Tamaru, A., Valdes, A.: Detecting Unusual Program Behavior Using the Statistical Components of NIDES. Technical report, SRI-CSL-95-06, SRI International, Computer Science Laboratory, Menlo Park, California (1995)
    • (1995) Technical Report
    • Anderson, D.1    Lunt, T.F.2    Javitz, H.3    Tamaru, A.4    Valdes, A.5
  • 44
    • 35048850623 scopus 로고    scopus 로고
    • Locality: A New Paradigm for Thinking about Normal Behavior and Outsider Threat
    • Ascona, Switzerland
    • McHugh, J., Gates, C.: Locality: A New Paradigm for Thinking about Normal Behavior and Outsider Threat. In: Proceedings of the ACM New Security Paradigms Workshop, Ascona, Switzerland (2003)
    • (2003) Proceedings of the ACM New Security Paradigms Workshop
    • McHugh, J.1    Gates, C.2
  • 45
    • 85180753454 scopus 로고    scopus 로고
    • User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement
    • San Diego, California
    • Jain, K., Sekar, R.: User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement. In: Proceedings of the Network and Distributed System Security Symposium, San Diego, California (2000) 19-34
    • (2000) Proceedings of the Network and Distributed System Security Symposium , pp. 19-34
    • Jain, K.1    Sekar, R.2
  • 52
    • 0000494607 scopus 로고
    • State Restoration in Systems of Communicating Processes
    • Russell, D.L.: State Restoration in Systems of Communicating Processes. IEEE Transactions on Software Engineering SE6 (1980) 133-144
    • (1980) IEEE Transactions on Software Engineering , vol.SE6 , pp. 133-144
    • Russell, D.L.1
  • 53
    • 20544453142 scopus 로고    scopus 로고
    • W32.bugbear@mm.
    • Liu, Y., Sevcenco, S.: W32.bugbear@mm. Symantec Security Response (2003) http://securityresponse.symantec.com/avcenter/venc/data/ w32.bugbear@mm.html.
    • (2003) Symantec Security Response
    • Liu, Y.1    Sevcenco, S.2
  • 54
    • 84860097162 scopus 로고    scopus 로고
    • Vbs.haptime.a@mm.
    • Sevcenco, S.: Vbs.haptime.a@mm. Symantec Security Response (2004) http://securityresponse.symantec.com/avcenter/venc/data/ vbs.haptime.a@mm.html.
    • (2004) Symantec Security Response
    • Sevcenco, S.1
  • 56
    • 84860097162 scopus 로고    scopus 로고
    • W32.mydoom.a@mm.
    • Ferrie, P., Lee, T.: W32.mydoom.a@mm. Symantec Security Response (2004) http://securityresponse.symantec.com/avcenter/venc/data/ w32.novarg.a@mm.html.
    • (2004) Symantec Security Response
    • Ferrie, P.1    Lee, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.