메뉴 건너뛰기




Volumn 5230 LNCS, Issue , 2008, Pages 39-58

Tamper-resistant, application-aware blocking of malicious network connections

Author keywords

Attack prevention; Firewall; Virtual machine introspection

Indexed keywords

ATTACK PREVENTION; BACKDOORS; EXTERNAL PROTECTIONS; FIREWALL; HYPERVISOR; LINUX SYSTEMS; MALICIOUS PACKETS; MALICIOUS TRAFFICS; MALWARE; MILLISECOND DELAYS; NETWORK CONNECTIONS; NETWORK FLOWS; PROCESS INFORMATIONS; PROCESS KNOWLEDGES; PROCESS-ORIENTED; TCP CONNECTIONS; UDP TRAFFICS; VIRTUAL MACHINE INTROSPECTION; VIRTUAL MACHINES;

EID: 56549109177     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-87403-4_3     Document Type: Conference Paper
Times cited : (56)

References (33)
  • 1
    • 34548708575 scopus 로고    scopus 로고
    • Lurking in the shadows: Identifying systemic threats to kernel data
    • Oakland, CA May
    • Baliga, A., Kamat, P., Iftode, L.: Lurking in the shadows: Identifying systemic threats to kernel data. In: IEEE Symposium on Security and Privacy, Oakland, CA (May 2007)
    • (2007) IEEE Symposium on Security and Privacy
    • Baliga, A.1    Kamat, P.2    Iftode, L.3
  • 5
    • 56549091385 scopus 로고    scopus 로고
    • CERT. TCP SYN Flooding and IP Spoofing Attacks. CERT Advisory CS-1996-21 (Last accessed April 4, 2008), http://www.cert.org/advisories/CA-1996-21.html
    • CERT. TCP SYN Flooding and IP Spoofing Attacks. CERT Advisory CS-1996-21 (Last accessed April 4, 2008), http://www.cert.org/advisories/CA-1996-21.html
  • 6
    • 56549085134 scopus 로고    scopus 로고
    • Check Point. ZoneAlarm (Last accessed April 4, 2008), http://www.zonealarm.com/store/content/home.jsp
    • Check Point. ZoneAlarm (Last accessed April 4, 2008), http://www.zonealarm.com/store/content/home.jsp
  • 7
    • 56549089345 scopus 로고    scopus 로고
    • Community Developers. Ebtables (Last accessed November 1, 2007), http://ebtables.sourceforge.net/
    • Community Developers. Ebtables (Last accessed November 1, 2007), http://ebtables.sourceforge.net/
  • 8
    • 56549095702 scopus 로고    scopus 로고
    • Community Developers. Tripwire (Last accessed November 1, 2007), http://sourceforge.net/projects/tripwire/
    • Community Developers. Tripwire (Last accessed November 1, 2007), http://sourceforge.net/projects/tripwire/
  • 12
    • 56549083366 scopus 로고    scopus 로고
    • Oskoboiny, G.: Whiteiist-based spam filtering (Last accessed April 4, 2008), http://impressive.net/people/gerald/2000/12/spam-filtering.html
    • Oskoboiny, G.: Whiteiist-based spam filtering (Last accessed April 4, 2008), http://impressive.net/people/gerald/2000/12/spam-filtering.html
  • 13
    • 56549092355 scopus 로고    scopus 로고
    • Grok. Coromputer Dunno (Last accessed April 4, 2008), http://lists.grok.org.uk/pipermail/full-disclosure/attacnments/20070911/ 87396911/attachment-0001.txt
    • Grok. Coromputer Dunno (Last accessed April 4, 2008), http://lists.grok.org.uk/pipermail/full-disclosure/attacnments/20070911/ 87396911/attachment-0001.txt
  • 14
    • 56549127327 scopus 로고    scopus 로고
    • Honeynet Project. Q8 (Last accessed April 4, 2008), http://www.honeynet. org/papers/bots/
    • Honeynet Project. Q8 (Last accessed April 4, 2008), http://www.honeynet. org/papers/bots/
  • 16
    • 38149053957 scopus 로고    scopus 로고
    • Jiang, X., Wang, X.: Out-of-the-box monitoring of VM-based high-interaction honeypots. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, 4637, pp. 198-218. Springer, Heidelberg (2007)
    • Jiang, X., Wang, X.: Out-of-the-box monitoring of VM-based high-interaction honeypots. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol. 4637, pp. 198-218. Springer, Heidelberg (2007)
  • 18
    • 56549099301 scopus 로고    scopus 로고
    • LKCD Project. LKCD - Linux Kernel Crash Dump (Last accessed April 4, 2008), http://lkcd.sourceforge.net/
    • LKCD Project. LKCD - Linux Kernel Crash Dump (Last accessed April 4, 2008), http://lkcd.sourceforge.net/
  • 20
    • 56549117543 scopus 로고    scopus 로고
    • b, Last accessed April 4
    • McAfee. BackDoor-Rev.b. (Last accessed April 4. 2008), http://vil.nai.com/vil/Content/v_136510.htm
    • (2008)
    • McAfee1    BackDoor-Rev2
  • 22
    • 56549124007 scopus 로고    scopus 로고
    • Packet Storm (Last accessed April 4, 2008), http://packetstormsecurity. org/UNIX/penetration/rootkits/bdoor.c.blackhole.c,cheetah,c,server.c,ovasOn.c
    • Packet Storm (Last accessed April 4, 2008), http://packetstormsecurity. org/UNIX/penetration/rootkits/bdoor.c.blackhole.c,cheetah,c,server.c,ovasOn.c
  • 23
    • 56549106372 scopus 로고    scopus 로고
    • Packet Storm (Last accessed April 4, 2008), http://packetstormsecurity. org/0209-exploits/apache-ssl-bug.c, apache-lirtux.txt
    • Packet Storm (Last accessed April 4, 2008), http://packetstormsecurity. org/0209-exploits/apache-ssl-bug.c, apache-lirtux.txt
  • 24
    • 56549130437 scopus 로고    scopus 로고
    • Packet Storm. Kaiten (Last accessed April 4, 2008), http:// packetstormsecurity.org/irc/kaiten.c
    • Packet Storm. Kaiten (Last accessed April 4, 2008), http:// packetstormsecurity.org/irc/kaiten.c
  • 25
    • 48649085344 scopus 로고    scopus 로고
    • rd Annual Computer Security Applications Conference (ACSAC), Miami, FL (December 2007)
    • rd Annual Computer Security Applications Conference (ACSAC), Miami, FL (December 2007)
  • 29
    • 85077745984 scopus 로고
    • TCP wrapper: Network monitoring, access control and booby traps
    • Baltimore, MD September
    • Venema, W.: TCP wrapper: Network monitoring, access control and booby traps. In: USENIX UNIX Security Symposium, Baltimore, MD (September 1992)
    • (1992) USENIX UNIX Security Symposium
    • Venema, W.1
  • 31
    • 56549101045 scopus 로고    scopus 로고
    • XenAccess Project. XenAccess Library (Last accessed April 4, 2008), http://xenaccess.sourceforge.net/
    • XenAccess Project. XenAccess Library (Last accessed April 4, 2008), http://xenaccess.sourceforge.net/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.