메뉴 건너뛰기




Volumn 4579 LNCS, Issue , 2007, Pages 109-128

Measurement and analysis of autonomous spreading malware in a university environment

Author keywords

Honeypots; Invasive software; Malware

Indexed keywords

BINARY SEQUENCES; INFORMATION ANALYSIS; INTERNET; REMOTE CONTROL;

EID: 37849044998     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-73614-1_7     Document Type: Conference Paper
Times cited : (16)

References (21)
  • 1
    • 33750376598 scopus 로고    scopus 로고
    • Baecher, P., Koetter, M., Holz, T., Dornseif, M., Freiling, F.C.: The nepenthes platform: An efficient approach to collect malware. In: Zamboni, D., Kruegel, C. (eds.) RAID 2006. LNCS, 4219, pp. 165-184. Springer, Heidelberg (2006)
    • Baecher, P., Koetter, M., Holz, T., Dornseif, M., Freiling, F.C.: The nepenthes platform: An efficient approach to collect malware. In: Zamboni, D., Kruegel, C. (eds.) RAID 2006. LNCS, vol. 4219, pp. 165-184. Springer, Heidelberg (2006)
  • 6
    • 33750320499 scopus 로고    scopus 로고
    • Leita, C., Dacier, M., Massicotte, F.: Automatic handling of protocol dependencies and reaction to 0-day attacks with scriptgen based honeypots. In: Zamboni, D., Kruegel, C. (eds.) RAID 2006. LNCS, 4219, pp. 185-205. Springer, Heidelberg (2006)
    • Leita, C., Dacier, M., Massicotte, F.: Automatic handling of protocol dependencies and reaction to 0-day attacks with scriptgen based honeypots. In: Zamboni, D., Kruegel, C. (eds.) RAID 2006. LNCS, vol. 4219, pp. 185-205. Springer, Heidelberg (2006)
  • 8
    • 0141762461 scopus 로고    scopus 로고
    • Moore, D., Shannon, C., claffy, k: Code-red: A case study on the spread and victims of an internet worm. In: MW '02: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurment, pp. 273-284. ACM Press, New York (2002)
    • Moore, D., Shannon, C., claffy, k: Code-red: A case study on the spread and victims of an internet worm. In: MW '02: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurment, pp. 273-284. ACM Press, New York (2002)
  • 10
    • 37849040737 scopus 로고    scopus 로고
    • Internet Accessed February 2007 February 2007
    • BBC News. Criminals 'may overwhelm the web'. Internet Accessed February 2007 (February 2007) http://news.bbc.co.uk/1/hi/business/6298641.stm
    • BBC News. Criminals 'may overwhelm the web
  • 11
    • 37849024600 scopus 로고    scopus 로고
    • Claus, R.F.: Overbeck. Efficient Observation of Botnets. Master's thesis, RWTH Aachen University (May 2007)
    • Claus, R.F.: Overbeck. Efficient Observation of Botnets. Master's thesis, RWTH Aachen University (May 2007)
  • 16
    • 26844548971 scopus 로고    scopus 로고
    • The Honeynet Project, March
    • The Honeynet Project. Know Your Enemy: Tracking Botnets (March 2005) http://www.honeynet.org/papers/bots/
    • (2005) Know Your Enemy: Tracking Botnets
  • 17
    • 37849013539 scopus 로고    scopus 로고
    • Attack of the zombie computers is growing threat. Internet
    • January
    • New York Times. Attack of the zombie computers is growing threat. Internet (January 2007) http://www.nytimes.com/2007/01/07/technology/07net.html
    • (2007) New York Times
  • 19
    • 37849017725 scopus 로고    scopus 로고
    • McAfee Whitepaper. Adware and spyware: Unraveling the financial web. Internet: Accessed February 2007 (August 2006) http://www.mcafee.com/us/ local_content/white_papers/threat-center/wp_adware.pdf
    • McAfee Whitepaper. Adware and spyware: Unraveling the financial web. Internet: Accessed February 2007 (August 2006) http://www.mcafee.com/us/ local_content/white_papers/threat-center/wp_adware.pdf


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.