메뉴 건너뛰기




Volumn , Issue , 2009, Pages 379-386

Framework for integrated proactive network worm detection and response

Author keywords

Adaptation; Aimulation; Network security; Network worms; Worm detection and containment

Indexed keywords

ADAPTATION; AIMULATION; DEFENSE MECHANISM; DYNAMIC ADAPTATIONS; NETWORK CONDITION; NETWORK HOSTS; NETWORK WORMS; PROACTIVE NETWORKS; RESPONSE MECHANISMS; SOFTWARE SYSTEMS; WORM DETECTION AND CONTAINMENT;

EID: 70349137128     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PDP.2009.52     Document Type: Conference Paper
Times cited : (4)

References (25)
  • 6
    • 85084163246 scopus 로고    scopus 로고
    • Autograph: Toward automated, distributed worm signature detection
    • H.-A. Kim, and B. Karp, "Autograph: Toward Automated, Distributed Worm Signature Detection," 13th USENIX Security Symposium. 2004.
    • (2004) 13th USENIX Security Symposium
    • Kim, H.-A.1    Karp, B.2
  • 7
    • 70349123823 scopus 로고    scopus 로고
    • LBNL/ICSI Enterprise Tracing Project
    • LBNL/ICSI Enterprise Tracing Project. http://www.icir.org/enterprise- tracing/index.html
  • 8
    • 70349102558 scopus 로고    scopus 로고
    • MAWI Working Group Traffic Archive
    • MAWI Working Group Traffic Archive. http://tracer.csl.sony.co.jp/mawi/
  • 10
    • 14344253939 scopus 로고    scopus 로고
    • Network telescopes: Observing small or distant security events
    • D. Moore, "Network Telescopes: Observing Small or Distant Security Events," 11th USENIX Security Symposium. 2002.
    • (2002) 11th USENIX Security Symposium
    • Moore, D.1
  • 11
    • 24644432749 scopus 로고    scopus 로고
    • Proactively detecting ddos attack using source IP address monitoring
    • T. Peng, C. Leckie, and R. Kotagiri, "Proactively Detecting DDoS Attack Using Source IP Address Monitoring," Lecture Notes in Computer Science, vol.3042, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3042
    • Peng, T.1    Leckie, C.2    Kotagiri, R.3
  • 12
    • 70349146730 scopus 로고    scopus 로고
    • Proactive
    • Proactive. Wikipedia. http://en.wikipedia.org/wiki/Proactive
  • 20
    • 84882630810 scopus 로고    scopus 로고
    • Very fast containment of scanning worms, Revisited
    • Malware Detection, Springer
    • N. Weaver, S. Staniford, and V. Paxson, "Very fast containment of scanning worms, Revisited," Advances in Information Security, vol.27. Malware Detection, Springer, 2007.
    • (2007) Advances in Information Security , vol.27
    • Weaver, N.1    Staniford, S.2    Paxson, V.3
  • 22
    • 84948951525 scopus 로고    scopus 로고
    • Throttling viruses: Restricting propagation to defeat malicious mobile code
    • Las Vegas, Nevada
    • M. Williamson, "Throttling Viruses: Restricting propagation to defeat malicious mobile code," Proc. of ACSAC Security Conference, Las Vegas, Nevada, 2002.
    • (2002) Proc. of ACSAC Security Conference
    • Williamson, M.1
  • 23
    • 70349091088 scopus 로고    scopus 로고
    • Malware evolution: A snapshot of threats and countermeasures in 2005
    • Springer
    • B. Witten, and C. Nachenberg, "Malware Evolution: A Snapshot of Threats and Countermeasures in 2005," Malware Detection, Springer, 2007.
    • Malware Detection , vol.2007
    • Witten, B.1    Nachenberg, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.