메뉴 건너뛰기




Volumn 5587 LNCS, Issue , 2009, Pages 1-20

A case study on asprox infection dynamics

Author keywords

Asprox; Malware; Security; SQL Injection

Indexed keywords

ASPROX; INFECTION DYNAMICS; MALWARE; MALWARES; REAL WORLD DATA; SECURITY; SQL INJECTION; WEB SERVERS;

EID: 70350646591     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-02918-9_1     Document Type: Conference Paper
Times cited : (4)

References (24)
  • 2
    • 70350669107 scopus 로고    scopus 로고
    • The Times: Asprox computer virus infects key government and consumer websites, http://technology.timesonline.co.uk/tol/news/tech and web/the web/article4381034.ece
    • The Times: Asprox computer virus infects key government and consumer websites, http://technology.timesonline.co.uk/tol/news/tech and web/the web/article4381034.ece
  • 5
    • 70350684114 scopus 로고    scopus 로고
    • ASPROX SQL Injection Attacks - Block them using a Cisco router
    • July
    • Cisco News: ASPROX SQL Injection Attacks - Block them using a Cisco router (July 2008), http://cisconews.co.uk/2008/07/09/asprox-sql-injection- attacks-block-them-using-a-cisco-router
    • (2008) Cisco News
  • 6
    • 70350644134 scopus 로고    scopus 로고
    • string automated SQL injection attack
    • Zino, M.: ASCII Encoded/Binary string automated SQL injection attack, http://www.bloombit.com/Articles/2008/05/ASCII-Encoded-Binary-String-Automated- SQL-Injection.aspx
    • ASCII Encoded/Binary
    • Zino, M.1
  • 7
    • 70350694705 scopus 로고    scopus 로고
    • Hexasoft Development Sdn, February 2008
    • Hexasoft Development Sdn. Bhd.: IP2Location geolocation service (February 2008), http://www.ip2location.com/
    • Bhd.: IP2Location geolocation service
  • 13
    • 70350642344 scopus 로고    scopus 로고
    • Holz, T., Gorecki, C., Rieck, K., Freiling, F.C.: Measuring and Detecting Fast-Flux Service Networks. In: NDSS (2008)
    • Holz, T., Gorecki, C., Rieck, K., Freiling, F.C.: Measuring and Detecting Fast-Flux Service Networks. In: NDSS (2008)
  • 14
    • 24344436426 scopus 로고    scopus 로고
    • Bailey, M., Cooke, E., Jahanian, F., Watson, D.: The Blaster Worm: Then and Now. In: IEEE Security and Privacy (2005)
    • Bailey, M., Cooke, E., Jahanian, F., Watson, D.: The Blaster Worm: Then and Now. In: IEEE Security and Privacy (2005)
  • 16
    • 84871999581 scopus 로고    scopus 로고
    • A Multifaced Approach to Understanding the Botnet Phenomenon
    • Rajab, M.A., Zarfoss, J., Monrose, F., Terzis, A.: A Multifaced Approach to Understanding the Botnet Phenomenon. In: ACM IMC (2006)
    • (2006) ACM IMC
    • Rajab, M.A.1    Zarfoss, J.2    Monrose, F.3    Terzis, A.4
  • 19
    • 70350652418 scopus 로고    scopus 로고
    • Anatomy of the Asprox Bonet
    • San Diego September
    • Brown, D.: Anatomy of the Asprox Bonet. ToorCon X - San Diego (September 2008)
    • (2008) ToorCon X
    • Brown, D.1
  • 24
    • 49949091964 scopus 로고    scopus 로고
    • Fluxor: Detecting and monitoring fast-flux service networks
    • Zamboni, D, ed, DIMVA 2008, Springer, Heidelberg
    • Passerini, E., Paleari, R., Martignoni, L., Bruschi, D.: Fluxor: detecting and monitoring fast-flux service networks. In: Zamboni, D. (ed.) DIMVA 2008. LNCS, vol. 5137, pp. 186-206. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5137 , pp. 186-206
    • Passerini, E.1    Paleari, R.2    Martignoni, L.3    Bruschi, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.