메뉴 건너뛰기




Volumn 18, Issue 2, 2009, Pages 231-262

vEye: Behavioral footprinting for self-propagating worm detection and profiling

Author keywords

Behavioral footprinting; Information systems; Network security; Sequence alignment; Worm detection

Indexed keywords

INFORMATION SYSTEMS; INFORMATION USE;

EID: 59849105307     PISSN: 02191377     EISSN: 02193116     Source Type: Journal    
DOI: 10.1007/s10115-008-0137-3     Document Type: Article
Times cited : (21)

References (61)
  • 1
    • 59849085532 scopus 로고    scopus 로고
    • Agobot Backdoor. http://www.viruslist.com/en/viruses/ encyclopedia?virusid=42101
    • Agobot Backdoor
  • 12
    • 14944346102 scopus 로고    scopus 로고
    • Automatically inferring patterns of resource consumption in network traffic
    • In: Karlsruhe, Germany, August 2003
    • Estan C, Savage S, Varghese G (2003) Automatically inferring patterns of resource consumption in network traffic. In: Proceedings of the ACM SIGCOMM conference, Karlsruhe, Germany, August 2003
    • (2003) Proceedings of the ACM SIGCOMM Conference
    • Estan, C.1    Savage, S.2    Varghese, G.3
  • 14
    • 85084164812 scopus 로고    scopus 로고
    • Collapsar: A VM-based architecture for network attack detention center
    • In: August 2004
    • Jiang X, Xu D (2004) Collapsar: A VM-based architecture for network attack detention center. In: Proceedings of the 13th USENIX security symposium, August 2004
    • (2004) Proceedings of the 13th USENIX Security Symposium
    • Jiang, X.1    Xu, D.2
  • 15
  • 22
    • 84858912639 scopus 로고    scopus 로고
    • Accessed 2001
    • Linux Lion Worms. http://www.whitehats.com/library/worms/lion. Accessed 2001
    • Linux Lion Worms
  • 23
    • 59849107034 scopus 로고    scopus 로고
    • MSBlaster Worms. Accessed August 2003
    • MSBlaster Worms. CERT advisory CA-2003-20 W32/Blaster worms. http://www.cert.org/advisories/CA-2003-20.htm. Accessed August 2003
    • CERT Advisory CA-2003-20 W32/Blaster Worms
  • 27
    • 28444495656 scopus 로고    scopus 로고
    • Network telescopes: Observing small or distant security events
    • August 2002
    • Moore D (2002) Network telescopes: Observing small or distant security events. In: Proceedings of the 11th USENIX security symposium, August 2002
    • (2002) Proceedings of the 11th USENIX Security Symposium
    • Moore, D.1
  • 31
    • 0015278845 scopus 로고
    • Behavioral phenotypes in organic genetic disease
    • Nyhan WL (1972) Behavioral phenotypes in organic genetic disease. Pediatr Res 6:1
    • (1972) Pediatr Res , vol.6 , pp. 1
    • Nyhan, W.L.1
  • 43
    • 59849124576 scopus 로고    scopus 로고
    • Accessed May 2004
    • Sasser Worms. http://www.microsoft.com/security/incident/sasser.as. Accessed May 2004
    • Sasser Worms
  • 44
    • 84883699276 scopus 로고    scopus 로고
    • Snort-inline. http://sourceforge.net/projects/snort-inline/
    • Snort-inline
  • 47
    • 0034513472 scopus 로고    scopus 로고
    • Dynamic Internet overlay deployment and management Using the X-Bone
    • In: November 2000
    • Touch J (2000) Dynamic Internet overlay deployment and management Using the X-Bone. In: Procedings of IEEE ICNP 2000, November 2000
    • (2000) Procedings of IEEE ICNP 2000
    • Touch, J.1
  • 51
    • 59849102294 scopus 로고    scopus 로고
    • VMware. http://www.vmware.com/
    • VMware
  • 52
    • 59849118229 scopus 로고    scopus 로고
    • Accessed August 2003
    • Welchia Worm. http://securityresponse.symantec.com/avcenter/venc/data/ w32.welchia.worm.htm. Accessed August 2003
    • Welchia Worm


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.