메뉴 건너뛰기




Volumn , Issue , 2007, Pages 11-18

Dark application communities

Author keywords

Automorphic; Dark application communities

Indexed keywords

AUTOMORPHIC WORMS; DARK APPLICATION COMMUNITIES; RECONNAISSANCE NETWORKS;

EID: 36949033129     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1278940.1278943     Document Type: Conference Paper
Times cited : (2)

References (38)
  • 4
    • 33745647290 scopus 로고    scopus 로고
    • th International Symposium on Recent Advances in Intrusion Detection (RAID) (September 2005), pp. 284-304.
    • th International Symposium on Recent Advances in Intrusion Detection (RAID) (September 2005), pp. 284-304.
  • 7
    • 84858481533 scopus 로고    scopus 로고
    • The Botnet Trackers
    • February
    • DAGON, D. The Botnet Trackers. Washington Post (February 2006). http ://www.washingtonpost.com/wp-dyn/content/article/2006/02/16/ AR20060%21601388.html.
    • (2006) Washington Post
    • DAGON, D.1
  • 8
  • 10
    • 36949029349 scopus 로고    scopus 로고
    • IANELLI, N., AND HACKWORTH, A. Botnets as a Vehicle for Online Crime. http ://www.cert.org/archive/pdf/Botnets.pdf, December 2005.
    • IANELLI, N., AND HACKWORTH, A. Botnets as a Vehicle for Online Crime. http ://www.cert.org/archive/pdf/Botnets.pdf, December 2005.
  • 19
    • 36949034044 scopus 로고    scopus 로고
    • Quantifying Application Behavior Space for Detection and Self-Healing
    • Tech. Rep. CUCS-017-06, Columbia University
    • LOCASTO, M. E., STAVROU, A., CRETU, G. F., STOLFO, S. J., AND KEROMYTIS, A. D. Quantifying Application Behavior Space for Detection and Self-Healing. Tech. Rep. CUCS-017-06, Columbia University, 2006.
    • (2006)
    • LOCASTO, M.E.1    STAVROU, A.2    CRETU, G.F.3    STOLFO, S.J.4    KEROMYTIS, A.D.5
  • 22
    • 16244366310 scopus 로고    scopus 로고
    • NETHERCOTE, N., AND SEWARD, J. Valgrind: A Program Supervision Framework. In Electronic Notes in Theoretical Computer Science (2003), 89.
    • NETHERCOTE, N., AND SEWARD, J. Valgrind: A Program Supervision Framework. In Electronic Notes in Theoretical Computer Science (2003), vol. 89.
  • 23
    • 36949037927 scopus 로고    scopus 로고
    • NEWSOME, J., BRUMLEY, D., AND SONG, D. Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software. In Proceedings of the 13 Symposium on Network and Distributed System Security (NDSS) (February 2006).
    • NEWSOME, J., BRUMLEY, D., AND SONG, D. Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software. In Proceedings of the 13 Symposium on Network and Distributed System Security (NDSS) (February 2006).
  • 25
    • 84858508160 scopus 로고    scopus 로고
    • th Annual Network and Distributed System Security Symposium (February 2005).
    • th Annual Network and Distributed System Security Symposium (February 2005).
  • 27
    • 36949005160 scopus 로고    scopus 로고
    • Midgard Worms: Sudden Nasty Surprises from a. Large Resilient Zombie Army
    • Tech. Rep. CSD-TR040019, University of Oregon
    • REIHER, P., LI, J., AND KUENNING, G. Midgard Worms: Sudden Nasty Surprises from a. Large Resilient Zombie Army. Tech. Rep. CSD-TR040019, University of Oregon, 2006.
    • (2006)
    • REIHER, P.1    LI, J.2    KUENNING, G.3
  • 29
    • 84858508157 scopus 로고    scopus 로고
    • th Symposium on Network and Distributed System Security (NDSS) (February 2006).
    • th Symposium on Network and Distributed System Security (NDSS) (February 2006).
  • 31
    • 36949030406 scopus 로고    scopus 로고
    • THE CAMBRIDGE-MIT INSTITUTE. DoS-Resistant Internet Working Group Meetings, February 2005.
    • THE CAMBRIDGE-MIT INSTITUTE. DoS-Resistant Internet Working Group Meetings, February 2005.
  • 32
    • 26844548971 scopus 로고    scopus 로고
    • THE HONEYNET PROJECT SZ RESEARCH ALLIANCE, March
    • THE HONEYNET PROJECT SZ RESEARCH ALLIANCE. Know your Enemy: Tracking Botnets. http://www.honeynet.org, March 2005.
    • (2005) Know your Enemy: Tracking Botnets
  • 35
    • 33750352075 scopus 로고    scopus 로고
    • Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits
    • August
    • WANG, H. J., GUO, C., SIMON, D. R., AND ZUGENMAIER, A. Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits. In ACM SIGCOMM (August 2004).
    • (2004) ACM SIGCOMM
    • WANG, H.J.1    GUO, C.2    SIMON, D.R.3    ZUGENMAIER, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.