메뉴 건너뛰기




Volumn 36, Issue 3 PART 1, 2009, Pages 4672-4679

A rough set approach for automatic key attributes identification of zero-day polymorphic worms

Author keywords

Polymorphic worm; Rough set theory; Zero day attack

Indexed keywords

COMPUTER CRIME; COMPUTER SYSTEM FIREWALLS; CRACK PROPAGATION; INTRUSION DETECTION;

EID: 58349117882     PISSN: 09574174     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.eswa.2008.06.037     Document Type: Article
Times cited : (15)

References (32)
  • 2
    • 58349113165 scopus 로고    scopus 로고
    • Chen, X., & Heidemann, J. (2004). Detecting early worm propagation through packet matching. Technical report ISI-TR-2004-585, USC/Information Sciences Institute.
    • Chen, X., & Heidemann, J. (2004). Detecting early worm propagation through packet matching. Technical report ISI-TR-2004-585, USC/Information Sciences Institute.
  • 3
    • 33846449866 scopus 로고    scopus 로고
    • Extracting drug utilization knowledge using self-organizing map and rough set theory
    • Chou H.C., Cheng C.H., and Chang J.R. Extracting drug utilization knowledge using self-organizing map and rough set theory. Expert Systems with Applications 33 2 (2007) 499-508
    • (2007) Expert Systems with Applications , vol.33 , Issue.2 , pp. 499-508
    • Chou, H.C.1    Cheng, C.H.2    Chang, J.R.3
  • 4
    • 33745788387 scopus 로고    scopus 로고
    • Crandall, J. R., Su, Z., & Wu, S. F. (2005). On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits. In Proceedings of ACM CCS.
    • Crandall, J. R., Su, Z., & Wu, S. F. (2005). On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits. In Proceedings of ACM CCS.
  • 5
    • 33646742035 scopus 로고    scopus 로고
    • PacketScore: A statistics-based packet filtering scheme against distributed denial-of-service attacks
    • Kim Y., Lau W.C., Chuah M.C., and Chao H.J. PacketScore: A statistics-based packet filtering scheme against distributed denial-of-service attacks. IEEE Transactions on Dependable and Secure Computing 3 2 (2006) 141-155
    • (2006) IEEE Transactions on Dependable and Secure Computing , vol.3 , Issue.2 , pp. 141-155
    • Kim, Y.1    Lau, W.C.2    Chuah, M.C.3    Chao, H.J.4
  • 6
    • 58349096247 scopus 로고    scopus 로고
    • Kruegel, C., & Kirda, E. (2005). Polymorphic worm detection using structural information of executables. In Proceedings of recent advances in intrusion detection (RAID).
    • Kruegel, C., & Kirda, E. (2005). Polymorphic worm detection using structural information of executables. In Proceedings of recent advances in intrusion detection (RAID).
  • 8
    • 33751064824 scopus 로고    scopus 로고
    • Li, Z., Sanghi, M., Chen, Y., Kao, M. Y., & Chavez, B. (2006). Hamsa: Fast signature generation for zero-day polymorphic worms with provable attack. In Proceedings of the 2006 IEEE symposium on security and privacy (pp. 32-47).
    • Li, Z., Sanghi, M., Chen, Y., Kao, M. Y., & Chavez, B. (2006). Hamsa: Fast signature generation for zero-day polymorphic worms with provable attack. In Proceedings of the 2006 IEEE symposium on security and privacy (pp. 32-47).
  • 9
    • 33745800070 scopus 로고    scopus 로고
    • Liang, Z., & Sekar, R. (2005). Fast and automated generation of attack signatures: A basis for building self-protecting servers. In Proceedings of ACM CCS.
    • Liang, Z., & Sekar, R. (2005). Fast and automated generation of attack signatures: A basis for building self-protecting servers. In Proceedings of ACM CCS.
  • 10
    • 0036321445 scopus 로고    scopus 로고
    • Use of K-nearest neighbor classifier for intrusion detection
    • Liao Y., and Vemuri R. Use of K-nearest neighbor classifier for intrusion detection. Computers and Security 21 5 (2001) 439-448
    • (2001) Computers and Security , vol.21 , Issue.5 , pp. 439-448
    • Liao, Y.1    Vemuri, R.2
  • 11
    • 35248857893 scopus 로고    scopus 로고
    • Mahoney, M., & Chan, P. K. (2003). An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection. In RAID (pp. 220-237).
    • Mahoney, M., & Chan, P. K. (2003). An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection. In RAID (pp. 220-237).
  • 12
    • 0030736223 scopus 로고    scopus 로고
    • Computer virus-antivirus coevolution
    • Nachenberg C. Computer virus-antivirus coevolution. Communications of the ACM 40 1 (1997) 46-51
    • (1997) Communications of the ACM , vol.40 , Issue.1 , pp. 46-51
    • Nachenberg, C.1
  • 13
    • 58349090419 scopus 로고    scopus 로고
    • Newsome, J., Karp, B., & Song, D. (2005). Polygraph: Automatically generating signatures for polymorphic worms. In Proceedings of the security and privacy symposium.
    • Newsome, J., Karp, B., & Song, D. (2005). Polygraph: Automatically generating signatures for polymorphic worms. In Proceedings of the security and privacy symposium.
  • 14
    • 58349102488 scopus 로고    scopus 로고
    • Newsome, J., & Song, D. (2005). Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proceedings of NDSS.
    • Newsome, J., & Song, D. (2005). Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proceedings of NDSS.
  • 15
    • 84942234675 scopus 로고    scopus 로고
    • Nojiri, D., Rowe, J., & Levitt, K. (2003). Cooperative response strategies for large scale attack mitigation. In Proceedings of the 3rd DARPA information survivability conference and exposition (DISCEX) (pp. 293-302).
    • Nojiri, D., Rowe, J., & Levitt, K. (2003). Cooperative response strategies for large scale attack mitigation. In Proceedings of the 3rd DARPA information survivability conference and exposition (DISCEX) (pp. 293-302).
  • 16
    • 33745133346 scopus 로고    scopus 로고
    • A monitoring system for detecting repeated packets with applications to computer worms
    • Oorschot P.C., Robert J.M., and Martin M.V. A monitoring system for detecting repeated packets with applications to computer worms. Internet Journal of Information Security 5 3 (2006) 186-199
    • (2006) Internet Journal of Information Security , vol.5 , Issue.3 , pp. 186-199
    • Oorschot, P.C.1    Robert, J.M.2    Martin, M.V.3
  • 17
    • 0034776786 scopus 로고    scopus 로고
    • Park, K. & Lee, H. (2001). On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internet. In Proceedings of ACM SIGCOMM'01 (pp. 15-26).
    • Park, K. & Lee, H. (2001). On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internet. In Proceedings of ACM SIGCOMM'01 (pp. 15-26).
  • 18
    • 0030393936 scopus 로고    scopus 로고
    • Pawlak, Z. (1996). Why rough sets? In Proceedings of the 5th IEEE international conference on fuzzy systems, Piscataway, New Jersey, USA (Vol. 2, pp. 738-743).
    • Pawlak, Z. (1996). Why rough sets? In Proceedings of the 5th IEEE international conference on fuzzy systems, Piscataway, New Jersey, USA (Vol. 2, pp. 738-743).
  • 19
    • 58349095971 scopus 로고    scopus 로고
    • Roesch, M. (2001). Snort: The lightweight network intrusion detection system. Accessed November 2007.
    • Roesch, M. (2001). Snort: The lightweight network intrusion detection system. Accessed November 2007.
  • 20
    • 58349106626 scopus 로고    scopus 로고
    • Russell, R. (1999). Linux iptables HOWTO. http://www.linuxguruz.com/iptables/howto. [Accessed November, 2007].
    • Russell, R. (1999). Linux iptables HOWTO. http://www.linuxguruz.com/iptables/howto. [Accessed November, 2007].
  • 21
    • 58349092289 scopus 로고    scopus 로고
    • Shannon, C. & Moore, D. (2004). The spread of the Witty worm. Accessed November 2007.
    • Shannon, C. & Moore, D. (2004). The spread of the Witty worm. Accessed November 2007.
  • 22
    • 33748195464 scopus 로고    scopus 로고
    • Rough set theory in analyzing the attributes of combination values for the insurance market
    • Shyng J.Y., Wang F.K., Tzeng G.H., and Wu K.S. Rough set theory in analyzing the attributes of combination values for the insurance market. Expert Systems with Applications 32 1 (2007) 56-64
    • (2007) Expert Systems with Applications , vol.32 , Issue.1 , pp. 56-64
    • Shyng, J.Y.1    Wang, F.K.2    Tzeng, G.H.3    Wu, K.S.4
  • 23
    • 58349091033 scopus 로고    scopus 로고
    • Singh, S., Estan, C., Varghese, G., & Savage, S. (2003). The earlybird system for real-time detection of unknown worms. Technical report CS-2003-0761, University of California, San Diego.
    • Singh, S., Estan, C., Varghese, G., & Savage, S. (2003). The earlybird system for real-time detection of unknown worms. Technical report CS-2003-0761, University of California, San Diego.
  • 24
    • 85084162258 scopus 로고    scopus 로고
    • Staniford, S., Paxson, V., & Weaver, N. (2002). How to own the Internet in your spare time. In Proceedings of the 11th USENIX security symposium.
    • Staniford, S., Paxson, V., & Weaver, N. (2002). How to own the Internet in your spare time. In Proceedings of the 11th USENIX security symposium.
  • 25
    • 58349090826 scopus 로고    scopus 로고
    • Symantec Corp. (2002). FreeBSD scalper worm. Accessed November 2007.
    • Symantec Corp. (2002). FreeBSD scalper worm. Accessed November 2007.
  • 26
    • 16244416222 scopus 로고    scopus 로고
    • On acquiring classification knowledge from noisy data based on rough set
    • Wang F.H. On acquiring classification knowledge from noisy data based on rough set. Expert Systems with Applications 29 (2005) 49-64
    • (2005) Expert Systems with Applications , vol.29 , pp. 49-64
    • Wang, F.H.1
  • 27
    • 58349119119 scopus 로고    scopus 로고
    • Wang, H., Guo, C., & Simon, D., & Zugenmaier, A. (2004). Shield: Vulnerability-driven network filters for preventing known vulnerability exploits. In Proceedings of ACM SIGCOMM'04, Portland, OR.
    • Wang, H., Guo, C., & Simon, D., & Zugenmaier, A. (2004). Shield: Vulnerability-driven network filters for preventing known vulnerability exploits. In Proceedings of ACM SIGCOMM'04, Portland, OR.
  • 28
    • 58349110713 scopus 로고    scopus 로고
    • Wang, W., Luo, D. S., & Zhang, J. (2006). Detect polymorphic worms based on semantic signature and data mining. In Proceedings of the first communications and networking conference, China.
    • Wang, W., Luo, D. S., & Zhang, J. (2006). Detect polymorphic worms based on semantic signature and data mining. In Proceedings of the first communications and networking conference, China.
  • 29
    • 33745154148 scopus 로고    scopus 로고
    • Xin, Y., Fang, B. X., Yun, X. C., & Chen, H. Y. (2005). Worm detection in large scale network by traffic. In Sixth international conference on parallel and distributed computing applications and technologies, China (pp. 270-273).
    • Xin, Y., Fang, B. X., Yun, X. C., & Chen, H. Y. (2005). Worm detection in large scale network by traffic. In Sixth international conference on parallel and distributed computing applications and technologies, China (pp. 270-273).
  • 30
    • 33748133783 scopus 로고    scopus 로고
    • Applying rough sets to prevent customer complaints for IC packaging foundry
    • Yang H.H., Liu T.C., and Lin Y.T. Applying rough sets to prevent customer complaints for IC packaging foundry. Expert Systems with Applications 32 1 (2007) 151-156
    • (2007) Expert Systems with Applications , vol.32 , Issue.1 , pp. 151-156
    • Yang, H.H.1    Liu, T.C.2    Lin, Y.T.3
  • 32
    • 58349112509 scopus 로고    scopus 로고
    • Zou, C. C., Gao, L., Gong, W., & Towsley, D. (2003). Monitoring and early warning for internet worms. Technical report TR-CSE-03-01, Department of Computer Science, University of Massachusetts, Amherst.
    • Zou, C. C., Gao, L., Gong, W., & Towsley, D. (2003). Monitoring and early warning for internet worms. Technical report TR-CSE-03-01, Department of Computer Science, University of Massachusetts, Amherst.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.