메뉴 건너뛰기




Volumn 58, Issue 9, 2009, Pages 1289-1296

A quasi-species model for the propagation and containment of polymorphic worms

Author keywords

Computer virus and worms; Modeling techniques; Network security

Indexed keywords

CO-EVOLUTION; INTRUSION DETECTION SYSTEMS; MODEL-BASED; MODELING TECHNIQUES; POLYMORPHIC WORMS;

EID: 68949183354     PISSN: 00189340     EISSN: None     Source Type: Journal    
DOI: 10.1109/TC.2009.63     Document Type: Article
Times cited : (14)

References (31)
  • 1
    • 33745788387 scopus 로고    scopus 로고
    • On Deriving Unknown Vulnerabilities from Zero-Day Polymorphic and Metamorphic Worm Exploits
    • J. Crandall et al., "On Deriving Unknown Vulnerabilities from Zero-Day Polymorphic and Metamorphic Worm Exploits," i Proc. ACM Computer and Comm. Security (CCS) i, pp. 235-248, 2005.
    • (2005) i Proc. ACM Computer and Comm. Security (CCS) , vol.1 , pp. 235-248
    • Crandall, J.1
  • 2
    • 33746389292 scopus 로고    scopus 로고
    • Polymorphic Worm Detection Using Structural Information of Executables
    • C. Kruegel et al., "Polymorphic Worm Detection Using Structural Information of Executables," i Proc. Recent Advances in Intrusion Detection (RAID) i, pp. 207-226, 2005.
    • (2005) i Proc. Recent Advances in Intrusion Detection (RAID) , vol.1 , pp. 207-226
    • Kruegel, C.1
  • 3
    • 33751064824 scopus 로고    scopus 로고
    • Z. Li et al., Hamsa: Fast Signature Generation for Zero-Day Polymorphic Worms with Provable Attack Resilience, i Proc. IEEE Symp. Security and Privacy (S&P) i, pp. 32-47, 2006.
    • Z. Li et al., "Hamsa: Fast Signature Generation for Zero-Day Polymorphic Worms with Provable Attack Resilience," i Proc. IEEE Symp. Security and Privacy (S&P) i, pp. 32-47, 2006.
  • 4
    • 27544498978 scopus 로고    scopus 로고
    • J. Newsome, B. Karp, and D. Song, Polygraph: Automatically Generating Signatures for Polymorphic Worms, i Proc. IEEE Symp. Security and Privacy (S&P) i, pp. 226-241, 2005.
    • J. Newsome, B. Karp, and D. Song, "Polygraph: Automatically Generating Signatures for Polymorphic Worms," i Proc. IEEE Symp. Security and Privacy (S&P) i, pp. 226-241, 2005.
  • 5
    • 25844462447 scopus 로고    scopus 로고
    • Defending Against Internet Worms: A Signature-Based Approach, i
    • Y. Tang and S. Chen, "Defending Against Internet Worms: A Signature-Based Approach," i Proc. IEEE INFOCOM i, pp. 1384-1393, 2005.
    • (2005) Proc. IEEE INFOCOM , vol.1 , pp. 1384-1393
    • Tang, Y.1    Chen, S.2
  • 6
    • 34248403361 scopus 로고    scopus 로고
    • Polymorphic Worm Detection and Defense: System Design, Experimental Methodology, and Data Resources
    • J. Wang, I. Hamadeh, G. Kesidis, and D. Miller, "Polymorphic Worm Detection and Defense: System Design, Experimental Methodology, and Data Resources," i Proc. ACM Large Scale Attack Defense Workshop i, pp. 169-176, 2006.
    • (2006) i Proc. ACM Large Scale Attack Defense Workshop , vol.1 , pp. 169-176
    • Wang, J.1    Hamadeh, I.2    Kesidis, G.3    Miller, D.4
  • 7
  • 8
    • 33846855150 scopus 로고    scopus 로고
    • M. Polychronakis, K. Anagnostakis, and E. Markatos, Network-Level Polymorphic Shellcode Detection Using Emulation, i J. Computer Virology i, 2, no. 4, pp. 257-274, Feb. 2007.
    • M. Polychronakis, K. Anagnostakis, and E. Markatos, "Network-Level Polymorphic Shellcode Detection Using Emulation," i J. Computer Virology i, vol. 2, no. 4, pp. 257-274, Feb. 2007.
  • 10
    • 33751051489 scopus 로고    scopus 로고
    • R. Perdisci et al., Misleading Worm Signature Generators Using Deliberate Noise Injection, i Proc. IEEE Symp. Security and Privacy (S&P) i, pp. 17-31, 2006.
    • R. Perdisci et al., "Misleading Worm Signature Generators Using Deliberate Noise Injection," i Proc. IEEE Symp. Security and Privacy (S&P) i, pp. 17-31, 2006.
  • 12
    • 0042474227 scopus 로고    scopus 로고
    • Modeling the Spread of Active Worms, i
    • Z. Chen, L. Gao, and K. Kwait, "Modeling the Spread of Active Worms," i Proc. IEEE INFOCOM i, pp. 1890-1900, 2003.
    • (2003) Proc. IEEE INFOCOM , vol.1 , pp. 1890-1900
    • Chen, Z.1    Gao, L.2    Kwait, K.3
  • 13
    • 34248995311 scopus 로고    scopus 로고
    • Modeling and Simulation Study of the Propagation and Defense of Internet Email Worm
    • 4, Apr
    • C. Zou, D. Towsley, and W. Gong, "Modeling and Simulation Study of the Propagation and Defense of Internet Email Worm," i IEEE Trans. Dependable and Secure Computing i, vol. 4, no. 2, pp. 105-118, Apr. 2007.
    • (2007) i IEEE Trans. Dependable and Secure Computing , vol.1 , Issue.2 , pp. 105-118
    • Zou, C.1    Towsley, D.2    Gong, W.3
  • 15
    • 0042474173 scopus 로고    scopus 로고
    • Internet Quarantine: Requirements for Containing Self-Propagating Code
    • D. Moore et al., "Internet Quarantine: Requirements for Containing Self-Propagating Code," Proc. IEEE INFOCOM, pp. 1901-1910, 2003.
    • (2003) Proc. IEEE INFOCOM , pp. 1901-1910
    • Moore, D.1
  • 16
    • 14844322335 scopus 로고    scopus 로고
    • Testing Network-Based Intrusion Detection Signatures Using Mutant Exploits
    • G. Vigna et al., "Testing Network-Based Intrusion Detection Signatures Using Mutant Exploits," Proc. ACM Computer and Comm. Security (CCS) pp. 21-30, 2004.
    • (2004) Proc. ACM Computer and Comm. Security (CCS) , pp. 21-30
    • Vigna, G.1
  • 17
    • 34548043748 scopus 로고    scopus 로고
    • Sweeper: A Lightweight End-to-End System for Defending Against Fast Worms
    • J. Tucek et al., "Sweeper: A Lightweight End-to-End System for Defending Against Fast Worms," Proc. European Professional Soc. for Systems (EuroSys) Conf., pp. 115-128, 2007.
    • (2007) Proc. European Professional Soc. for Systems (EuroSys) Conf , pp. 115-128
    • Tucek, J.1
  • 21
    • 77950788046 scopus 로고    scopus 로고
    • Panorama: Capturing System-Wide Information Flow for Malware Detection and Analysis
    • H. Yin et al., "Panorama: Capturing System-Wide Information Flow for Malware Detection and Analysis," Proc. ACM Computer and Comm. Security (CCS), pp. 116-127, 2007.
    • (2007) Proc. ACM Computer and Comm. Security (CCS) , pp. 116-127
    • Yin, H.1
  • 23
    • 0034598259 scopus 로고    scopus 로고
    • Error Thresholds for Quasispecies on Dynamic Fitness Landscapes
    • Jan
    • M. Nilsson and N. Snoad, "Error Thresholds for Quasispecies on Dynamic Fitness Landscapes," Physical Rev. Letters, vol. 84, no. 1, pp. 191-194, Jan. 2000.
    • (2000) Physical Rev. Letters , vol.84 , Issue.1 , pp. 191-194
    • Nilsson, M.1    Snoad, N.2
  • 24
    • 4043163016 scopus 로고    scopus 로고
    • Coevolution of Quasispecies: B-Cell Mutation Rates Maximize Viral Error Catastrophes
    • Feb
    • C. Kamp and S. Bornholdt, "Coevolution of Quasispecies: B-Cell Mutation Rates Maximize Viral Error Catastrophes," Physical Rev. Letters, vol. 88, no. 6, pp. 068104.1-068104.4, Feb. 2002.
    • (2002) Physical Rev. Letters , vol.88 , Issue.6
    • Kamp, C.1    Bornholdt, S.2
  • 25
    • 0030736223 scopus 로고    scopus 로고
    • Computer Virus-Antivirus Coevolution
    • Jan
    • C. Nachenberg, "Computer Virus-Antivirus Coevolution," Comm. ACM vol. 40, no. 1, pp. 46-51, Jan. 1997.
    • (1997) Comm. ACM , vol.40 , Issue.1 , pp. 46-51
    • Nachenberg, C.1
  • 26
    • 33751056900 scopus 로고    scopus 로고
    • Towards Automatic Generation of Vulnerability-Based Signatures
    • D. Brumley et al., "Towards Automatic Generation of Vulnerability-Based Signatures," Proc. IEEE Symp. Security and Privacy (S&P), pp. 2-16, 2006.
    • (2006) Proc. IEEE Symp. Security and Privacy (S&P) , pp. 2-16
    • Brumley, D.1
  • 29
    • 34548318486 scopus 로고    scopus 로고
    • A Quasi-Species Approach for Modeling the Dynamics of Polymorphic Worms
    • B. Stephenson and B. Sikdar, "A Quasi-Species Approach for Modeling the Dynamics of Polymorphic Worms," Proc. IEEE INFOCOM, pp. 1-12, 2006.
    • (2006) Proc. IEEE INFOCOM , pp. 1-12
    • Stephenson, B.1    Sikdar, B.2
  • 31
    • 68949166716 scopus 로고    scopus 로고
    • K2, ADMmutate, http://www.ktwo.ca/c/ADMmutate-0.8.4.tar.gz, 2009.
    • (2009) K2, ADMmutate


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.