메뉴 건너뛰기




Volumn 19, Issue 7, 2008, Pages 890-902

Tracing worm break-in and contaminations via process coloring: A provenance-preserving approach

Author keywords

Computer forensics; Internet worm; Networked server; Process coloring; System monitoring

Indexed keywords

COMPUTER FORENSICS; INTERNET WORM; NETWORKED SERVER; PROCESS COLORING; SYSTEM MONITORING;

EID: 64349114055     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2007.70765     Document Type: Article
Times cited : (14)

References (49)
  • 1
    • 64349107386 scopus 로고    scopus 로고
    • Linux Adore Worms, http://securityresponse.symantec.com/avcenter/ venc/data/linux.adore.worm.htm, 2007.
    • (2007) Linux Adore Worms
  • 2
    • 64349111428 scopus 로고    scopus 로고
    • Linux Ramen Worm, http://service1.symantec.com/sarc/sarc.nsf/html/ pf/linux.ramen.worm.html, 2007.
    • (2007) Linux Ramen Worm
  • 3
    • 64349094543 scopus 로고    scopus 로고
    • SANS Institute
    • SANS Institute: Lion Worm, http://www.sans.com/y2k/lion.htm, 2007.
    • (2007) Lion Worm
  • 4
    • 64349114980 scopus 로고    scopus 로고
    • Sebek, http://www.honeynet.org/tools/sebek/, 2007.
    • (2007) Sebek
  • 5
    • 64349119248 scopus 로고    scopus 로고
    • The Honeynet Project
    • The Honeynet Project, http://www.honeynet.org, 2007.
    • (2007)
  • 7
    • 64349118389 scopus 로고    scopus 로고
    • 39020375,39191840,00.htm
    • Virus Writers Get Stealthy, http://news.zdnet.co.uk/internet/ security/0,39020375,39191840,00.htm, 2007.
    • (2007) Virus Writers Get Stealthy
  • 8
    • 64349123782 scopus 로고    scopus 로고
    • June 2003
    • SARS Worms, http://www.xfocus.net/tools/200306/413.html, June 2003.
    • Worms, S.A.R.S.1
  • 9
    • 0036709428 scopus 로고    scopus 로고
    • Recovery from Malicious Transactions
    • Sept
    • P. Ammann, S. Jajodia, and P. Liu, "Recovery from Malicious Transactions," IEEE Trans. Knowledge and Data Eng., vol. 14, no. 5, pp. 1167-1185, Sept. 2002.
    • (2002) IEEE Trans. Knowledge and Data Eng , vol.14 , Issue.5 , pp. 1167-1185
    • Ammann, P.1    Jajodia, S.2    Liu, P.3
  • 10
    • 0030353831 scopus 로고    scopus 로고
    • MITRE Technical Report 2547 (Secure Computer System): Volume II
    • D. Bell and L. LaPadula, "MITRE Technical Report 2547 (Secure Computer System): Volume II," J. Computer Security, vol. 4, nos. 2/3, pp. 239-263, 1996.
    • (1996) J. Computer Security , vol.4 , Issue.2-3 , pp. 239-263
    • Bell, D.1    LaPadula, L.2
  • 11
    • 33947702316 scopus 로고    scopus 로고
    • Pervasive Binding of Labels to System Processes,
    • PhD dissertation, Purdue Univ, also as CERIAS Technical Report, 54
    • F. Buchholz, "Pervasive Binding of Labels to System Processes," PhD dissertation, Purdue Univ., also as CERIAS Technical Report 2005-54, 2005.
    • (2005)
    • Buchholz, F.1
  • 12
    • 10644245884 scopus 로고    scopus 로고
    • On the Role of File System Metadata in Digital Forensics
    • Dec
    • F. Buchholz and E.H. Spafford, "On the Role of File System Metadata in Digital Forensics," J. Digital Investigation, Dec. 2004.
    • (2004) J. Digital Investigation
    • Buchholz, F.1    Spafford, E.H.2
  • 16
    • 0023266943 scopus 로고
    • A Comparison of Commercial and Military Computer Security Policies
    • 87, pp
    • D.R. Clark and D.R. Wilson, "A Comparison of Commercial and Military Computer Security Policies," Proc. IEEE Symp. Security and Privacy (S&P '87), pp. 184-194, 1987.
    • (1987) Proc. IEEE Symp. Security and Privacy (S&P , pp. 184-194
    • Clark, D.R.1    Wilson, D.R.2
  • 17
    • 0016949746 scopus 로고
    • A Lattice Model of Secure Information Flow
    • May
    • D.E. Denning, "A Lattice Model of Secure Information Flow," Comm. ACM, vol. 19, pp. 236-243, May 1976.
    • (1976) Comm. ACM , vol.19 , pp. 236-243
    • Denning, D.E.1
  • 22
    • 20344391930 scopus 로고    scopus 로고
    • Intel Virtualization Technology
    • May
    • R. Uhlig et al., "Intel Virtualization Technology," Computer, special issue on virtualization technology, May 2005.
    • (2005) Computer , Issue.SPEC. ISSUE ON VIRTUALIZATION TECHNOLOGY
    • Uhlig, R.1
  • 30
    • 85084164812 scopus 로고    scopus 로고
    • Collapsar: A VM-Based Architecture for Network Attack Detention Center
    • Aug
    • X. Jiang and D. Xu, "Collapsar: A VM-Based Architecture for Network Attack Detention Center," Proc. 13th Usenix Security Symp., Aug. 2004.
    • (2004) Proc. 13th Usenix Security Symp
    • Jiang, X.1    Xu, D.2
  • 38
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software
    • Feb
    • J. Newsome and D. Song, "Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software," Proc. Network and Distributed System Security Symp. (NDSS '05), Feb. 2005.
    • (2005) Proc. Network and Distributed System Security Symp. (NDSS '05)
    • Newsome, J.1    Song, D.2
  • 41
    • 84878346861 scopus 로고    scopus 로고
    • Improving Host Security with System Call Policies
    • Aug
    • N. Provos, "Improving Host Security with System Call Policies," Proc. 12th Usenix Security Symp., Aug. 2003.
    • (2003) Proc. 12th Usenix Security Symp
    • Provos, N.1
  • 44
    • 84960561455 scopus 로고
    • On Computable Numbers, with an Application to the Entscheidungs Problem
    • A.M. Turing, "On Computable Numbers, with an Application to the Entscheidungs Problem," Proc. London Math. Soc. Series 2, vol. 42, pp. 230-265, 1937.
    • (1937) Proc. London Math. Soc. Series 2 , vol.42 , pp. 230-265
    • Turing, A.M.1
  • 47
    • 85038810709 scopus 로고    scopus 로고
    • Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks
    • W. Xu, S. Bhatkar, and R. Sekar, "Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks," Proc. 15th Usenix Security Symp., 2006.
    • (2006) Proc. 15th Usenix Security Symp
    • Xu, W.1    Bhatkar, S.2    Sekar, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.