메뉴 건너뛰기




Volumn , Issue , 2007, Pages 164-173

Network-based and attack-resilient length signature generation for zero-day polymorphic worms

Author keywords

[No Author keywords available]

Indexed keywords

ARSENIC COMPOUNDS; GATEWAYS (COMPUTER NETWORKS); INTERNET; NETWORK SECURITY;

EID: 48349098240     PISSN: 10921648     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICNP.2007.4375847     Document Type: Conference Paper
Times cited : (20)

References (40)
  • 1
    • 33846294027 scopus 로고    scopus 로고
    • Automatic generation of buffer overflow attack signatures: An approach based on program behavior models
    • Z. Liang and R. Sekar, "Automatic generation of buffer overflow attack signatures: An approach based on program behavior models," in Proc. of Computer Security Applications Conference (ACSAC), 2005.
    • (2005) Proc. of Computer Security Applications Conference (ACSAC)
    • Liang, Z.1    Sekar, R.2
  • 4
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • V. Paxson, "Bro: A system for detecting network intruders in real-time," Computer Networks, vol. 31, 1999.
    • (1999) Computer Networks , vol.31
    • Paxson, V.1
  • 7
    • 85084163246 scopus 로고    scopus 로고
    • Autograph: Toward automated, distributed worm signature detection
    • H. Kim and B. Karp, "Autograph: Toward automated, distributed worm signature detection," in Proc. of USENIX Security Symposium, 2004.
    • (2004) Proc. of USENIX Security Symposium
    • Kim, H.1    Karp, B.2
  • 8
    • 33745800070 scopus 로고    scopus 로고
    • Fast and automated generation of attack signatures: A basis for building self-protecting servers
    • Z. Liang and R. Sekar, "Fast and automated generation of attack signatures: A basis for building self-protecting servers," in Proc. of ACM CCS, 2005.
    • (2005) Proc. of ACM CCS
    • Liang, Z.1    Sekar, R.2
  • 9
    • 34547261222 scopus 로고    scopus 로고
    • Packet vaccine: Black-box exploit detection and signature generation
    • X. Wang et al., "Packet vaccine: Black-box exploit detection and signature generation," in Proc. of ACM CCS, 2006.
    • (2006) Proc. of ACM CCS
    • Wang, X.1
  • 10
  • 16
    • 48349097478 scopus 로고    scopus 로고
    • Defending against internet worms: A signature-based approach
    • Y. Tang and S. Chen, "Defending against internet worms: A signature-based approach," in Proc. of IEEE Infocom, 2003.
    • (2003) Proc. of IEEE Infocom
    • Tang, Y.1    Chen, S.2
  • 17
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • J. Newsome and D. Song, "Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software," in Proc. of NDSS, 2005.
    • (2005) Proc. of NDSS
    • Newsome, J.1    Song, D.2
  • 18
    • 33745788387 scopus 로고    scopus 로고
    • On deriving unknown vulnerabilities from zeroday polymorphic and metamorphic worm exploits
    • J. R. Crandall, Z. Su, and S. F. Wu, "On deriving unknown vulnerabilities from zeroday polymorphic and metamorphic worm exploits," in Proc. of ACM CCS, 2005.
    • (2005) Proc. of ACM CCS
    • Crandall, J.R.1    Su, Z.2    Wu, S.F.3
  • 19
    • 33751051489 scopus 로고    scopus 로고
    • Misleading worm signature generators using deliberate noise injection
    • R. Perdisci et al., "Misleading worm signature generators using deliberate noise injection," in Proc. of IEEE Security and Privacy Symposium, 2006.
    • (2006) Proc. of IEEE Security and Privacy Symposium
    • Perdisci, R.1
  • 20
    • 33846893358 scopus 로고    scopus 로고
    • Paragraph: Thwarting signature learning by training maliciously
    • J. Newsome, B. Karp, and D. Song, "Paragraph: Thwarting signature learning by training maliciously," in Proc. of RAID, 2006.
    • (2006) Proc. of RAID
    • Newsome, J.1    Karp, B.2    Song, D.3
  • 21
    • 48349122173 scopus 로고    scopus 로고
    • Allergy attack against automatic signature generation
    • S. P. Chuang and A. K. Mok, "Allergy attack against automatic signature generation," in Proc. of RAID, 2006.
    • (2006) Proc. of RAID
    • Chuang, S.P.1    Mok, A.K.2
  • 23
    • 84923445084 scopus 로고    scopus 로고
    • An architecture for generating semantic-aware signatures
    • V. Yegneswaran et al., "An architecture for generating semantic-aware signatures," in Proc. of USENIX Security Symposium, 2005.
    • (2005) Proc. of USENIX Security Symposium
    • Yegneswaran, V.1
  • 24
    • 33746389292 scopus 로고    scopus 로고
    • Polymorphic worm detection using structural information of executables
    • C. Kruegel et al., "Polymorphic worm detection using structural information of executables," in Proc. of RAID, 2005.
    • (2005) Proc. of RAID
    • Kruegel, C.1
  • 26
    • 30344438592 scopus 로고    scopus 로고
    • Anomalous payload-based network intrusion detection
    • K. Wang and S. J. Stolfo, "Anomalous payload-based network intrusion detection," in Proc. of RAID, 2004.
    • (2004) Proc. of RAID
    • Wang, K.1    Stolfo, S.J.2
  • 27
    • 33750351545 scopus 로고    scopus 로고
    • Anomalous payload-based worm detection and signature generation
    • K. Wang, G. Cretu, and S. J. Stolfo, "Anomalous payload-based worm detection and signature generation," in Proc. of RAID, 2005.
    • (2005) Proc. of RAID
    • Wang, K.1    Cretu, G.2    Stolfo, S.J.3
  • 29
    • 84885679117 scopus 로고    scopus 로고
    • M. Cost et al., Vigilante: End-to-end containment of internet worms, in Proc. of ACM Symposium on Operating System Principles (SOSP), 2005.
    • M. Cost et al., "Vigilante: End-to-end containment of internet worms," in Proc. of ACM Symposium on Operating System Principles (SOSP), 2005.
  • 30
    • 33745777666 scopus 로고    scopus 로고
    • Ctcp: A centralized TCP/IP architecture for networking security
    • F. Hsu and T. Chiueh, "Ctcp: A centralized TCP/IP architecture for networking security," in Proc. of ACSAC, 2004.
    • (2004) Proc. of ACSAC
    • Hsu, F.1    Chiueh, T.2
  • 31
    • 85027555608 scopus 로고    scopus 로고
    • Sigfree: A signature-free buffer overflow attack blocker
    • X. Wang et al., "Sigfree: A signature-free buffer overflow attack blocker," in Proc. of USENIX Security Symposium, 2006.
    • (2006) Proc. of USENIX Security Symposium
    • Wang, X.1
  • 32
    • 14944341848 scopus 로고    scopus 로고
    • On the design and use of internet sinks for network abuse monitoring
    • V. Yegneswaran, P. Barford, and D. Plonka, "On the design and use of internet sinks for network abuse monitoring," in Proc. of RAID, 2004.
    • (2004) Proc. of RAID
    • Yegneswaran, V.1    Barford, P.2    Plonka, D.3
  • 33
    • 33646000916 scopus 로고    scopus 로고
    • The internet motion sensor: A distributed blackhole monitoring system
    • M. Bailey et al., "The internet motion sensor: A distributed blackhole monitoring system," in Proc. of NDSS, 2005.
    • (2005) Proc. of NDSS
    • Bailey, M.1
  • 36
    • 34547396634 scopus 로고    scopus 로고
    • binpac: A yacc for writing application protocol parsers
    • R. Pang et al., "binpac: A yacc for writing application protocol parsers," in Proc. of ACM/USENIX IMC, 2006.
    • (2006) Proc. of ACM/USENIX IMC
    • Pang, R.1
  • 37
    • 48349130120 scopus 로고    scopus 로고
    • S. A. Vinterbo, Maximum k-intersection, edge labeled multigraph max capacity k-path, and max factor k-gcd are all NP-hard, Decision Systems Group,Harvard Medical School, Tech. Rep., 2002.
    • S. A. Vinterbo, "Maximum k-intersection, edge labeled multigraph max capacity k-path, and max factor k-gcd are all NP-hard," Decision Systems Group,Harvard Medical School, Tech. Rep., 2002.
  • 39
    • 85091893445 scopus 로고    scopus 로고
    • Rethinking hardware support for network analysis and intrusion prevention
    • V. Paxson et al., "Rethinking hardware support for network analysis and intrusion prevention," in Proc. of USENIX Hot Security, 2006.
    • (2006) Proc. of USENIX Hot Security
    • Paxson, V.1
  • 40
    • 77249177810 scopus 로고    scopus 로고
    • Radware Inc
    • Radware Inc., "Introducing 1000X Security Switching," http://www.radware.com/content/products/application_switches/ss/default%.asp.
    • Introducing 1000X Security Switching


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.