메뉴 건너뛰기




Volumn , Issue , 2007, Pages 64-73

HoneyIM: Fast detection and suppression of instant messaging malware in enterprise-like networks

Author keywords

[No Author keywords available]

Indexed keywords

AND RECOVERY; COMPUTER SECURITY APPLICATIONS; CONTACT LIST; CORE DESIGNS; FALSE POSITIVE; FALSE POSITIVE RATE; HONEY POT; IM SERVICES; INSTANT MESSAGING; MALWARE; MALWARE DETECTION; NETWORK ADMINISTRATORS; NETWORK ENVIRONMENTS; OPEN SOURCES; REAL EXPERIMENTS; SOCIAL ENGINEERING; SUPPRESSION MECHANISM;

EID: 48649108112     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSAC.2007.24     Document Type: Conference Paper
Times cited : (25)

References (35)
  • 1
    • 48649088747 scopus 로고    scopus 로고
    • Pidgin. http://pidgin.im/, 2007.
    • (2007) Pidgin
  • 2
    • 0036349136 scopus 로고    scopus 로고
    • On Distinguishing Between Internet Power Law Topology Generators
    • New York, NY, June
    • T. Bu and D. Towsley. On Distinguishing Between Internet Power Law Topology Generators. In Proceedings of the 2002 IEEE INFOCOM, pages 638-647, New York, NY, June 2002.
    • (2002) Proceedings of the 2002 IEEE INFOCOM , pp. 638-647
    • Bu, T.1    Towsley, D.2
  • 4
    • 48649100871 scopus 로고    scopus 로고
    • M. Hicks. Reuters suspends im service due to kelvir worm. http://www.eweek.com/article2/0,1759,1786151,00.asp, Apri 2005.
    • M. Hicks. Reuters suspends im service due to kelvir worm. http://www.eweek.com/article2/0,1759,1786151,00.asp, Apri 2005.
  • 6
    • 48649097012 scopus 로고    scopus 로고
    • IBM. Lotus Sametime. http://www-142.ibm.com/software/sw-lotus/sametime.
    • Sametime
  • 9
    • 18144370814 scopus 로고    scopus 로고
    • Instant messaging: A new target for hackers
    • July
    • N. Leavitt. Instant messaging: A new target for hackers. Computer, 38(7):20-23, July 2005.
    • (2005) Computer , vol.38 , Issue.7 , pp. 20-23
    • Leavitt, N.1
  • 11
    • 48649097468 scopus 로고    scopus 로고
    • Defending against instant messaging worms
    • San Francisco, CA, Nov
    • Z. Liu, G. Shu, N. Li, , and D. Lee. Defending against instant messaging worms. In Proceedings of IEEE GLOBECOM 2006, pages 1-6, San Francisco, CA, Nov. 2006.
    • (2006) Proceedings of IEEE GLOBECOM , pp. 1-6
    • Liu, Z.1    Shu, G.2    Li, N.3    Lee, D.4
  • 13
    • 31844456208 scopus 로고    scopus 로고
    • On Instant Messaging Worms, Analysis and Countermeasures
    • Fairfax, VA, Nov
    • M. Mannan and P. C. van Oorschot. On Instant Messaging Worms, Analysis and Countermeasures. In Proceedings of WORM 2005, pages 2-11, Fairfax, VA, Nov. 2005.
    • (2005) Proceedings of WORM , pp. 2-11
    • Mannan, M.1    van Oorschot, P.C.2
  • 15
    • 34848915641 scopus 로고    scopus 로고
    • The Structure of An Instant Messenger Network and Its Vulnerability to Malicious Codes
    • Philadelphia, PA, Aug
    • C. D. Morse and H. Wang. The Structure of An Instant Messenger Network and Its Vulnerability to Malicious Codes. In Proceedings of ACM SIGCOMM 2005 Poster Session, Philadelphia, PA, Aug. 2005.
    • (2005) Proceedings of ACM SIGCOMM 2005 Poster Session
    • Morse, C.D.1    Wang, H.2
  • 17
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • San Diego, CA, Feb
    • J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proceedings of the 12th NDSS, San Diego, CA, Feb. 2005.
    • (2005) Proceedings of the 12th NDSS
    • Newsome, J.1    Song, D.2
  • 20
    • 48649095257 scopus 로고    scopus 로고
    • October 2006
    • C. Raiu. The IM worms armada. http://www.viruslist.com/en/weblog? weblogid=203678309, October 2006.
    • The IM worms armada
    • Raiu, C.1
  • 25
    • 84855752748 scopus 로고    scopus 로고
    • Sophos. Troj/Kelvir-M. http://www.sophos.com/virusinfo/analyses/ trojkelvirm.html.
    • Troj/Kelvir-M
  • 26
    • 48649100115 scopus 로고    scopus 로고
    • Sophos. W32/Jitux-A. http://www.sophos.com/virusinfo/analyses/w32jituxa. html.
    • Sophos. W32/Jitux-A
  • 27
    • 48649087130 scopus 로고    scopus 로고
    • Sophos. W32/Kelvir-F. http://www.sophos.com/virusinfo/analyses/ w32kelvirf.html.
    • Sophos. W32/Kelvir-F
  • 28
    • 48649087130 scopus 로고    scopus 로고
    • Sophos. W32/Kelvir-Q. http://www.sophos.com/virusinfo/analyses/ w32kelvirq.html.
    • Sophos. W32/Kelvir-Q
  • 30
    • 0012109964 scopus 로고    scopus 로고
    • The Honeynet Project, 2nd Edition, Addison-Wesley Professional, May
    • The Honeynet Project. Know Your Enemy: Learning about Security Threats (2nd Edition). Addison-Wesley Professional, May 2004.
    • (2004) Know Your Enemy: Learning about Security Threats
  • 31
    • 85035794100 scopus 로고    scopus 로고
    • Analyzing Network and Content Characteristics of Spim Using Honeypots
    • Santa Clara, CA, June
    • A. J. Trivedi, P. Q. Judge, and S. Krasser. Analyzing Network and Content Characteristics of Spim Using Honeypots. In Proceedings of the 3rd USENIX SRUTI, Santa Clara, CA, June 2007.
    • (2007) Proceedings of the 3rd USENIX SRUTI
    • Trivedi, A.J.1    Judge, P.Q.2    Krasser, S.3
  • 32
    • 84904088330 scopus 로고    scopus 로고
    • Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities
    • San Diego, CA, Feb
    • Y.-M. Wang, D. Beck, X. Jiang, R. Roussev, C. Verbowski, S. Chen, and S. King. Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities. In Proceedings of the 13th NDSS, San Diego, CA, Feb. 2006.
    • (2006) Proceedings of the 13th NDSS
    • Wang, Y.-M.1    Beck, D.2    Jiang, X.3    Roussev, R.4    Verbowski, C.5    Chen, S.6    King, S.7
  • 33
    • 34848860968 scopus 로고    scopus 로고
    • Virus throttling for instant messaging
    • Technical report, HP Lab Bristol, May
    • M. M. Williamson, A. Parry, and A. Byde. Virus throttling for instant messaging. Technical report, HP Lab Bristol, May 2004.
    • (2004)
    • Williamson, M.M.1    Parry, A.2    Byde, A.3
  • 34
    • 34848889285 scopus 로고    scopus 로고
    • Understanding Instant Messaging Traffic Characteristics
    • Toronto, Canada, June
    • Z. Xiao, L. Guo, and J. Tracey. Understanding Instant Messaging Traffic Characteristics. In Proceedings of the 27th ICDCS, Toronto, Canada, June 2007.
    • (2007) Proceedings of the 27th ICDCS
    • Xiao, Z.1    Guo, L.2    Tracey, J.3
  • 35
    • 34248995311 scopus 로고    scopus 로고
    • Modeling and Simulation Study of the Propagation and Defense of Internet Email Worm
    • April-June
    • C. C. Zou, D. Towsley, and W. Gong. Modeling and Simulation Study of the Propagation and Defense of Internet Email Worm. IEEE Transactions on Dependable and Secure Computing, 4(2):105-118, April-June 2007.
    • (2007) IEEE Transactions on Dependable and Secure Computing , vol.4 , Issue.2 , pp. 105-118
    • Zou, C.C.1    Towsley, D.2    Gong, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.