-
3
-
-
85084162258
-
How to own the Internet in your spare time
-
USENIX Association
-
S. Staniford, V. Paxson, and N. Weaver, "How to own the Internet in your spare time, " Proc. 11th USENIX Security Symposium, pp. 149-167, USENIX Association, 2002.
-
(2002)
Proc. 11th USENIX Security Symposium
, pp. 149-167
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
-
4
-
-
26844507894
-
Routing worm: A fast, selective attack worm based on ip address information
-
Washington D. C.
-
C. C. Zou, D. Towsley, W. Gong, and S. Cai, "Routing worm: A fast, selective attack worm based on ip address information, " Proc. PADS '05, pp. 199-206, Washington D. C., 2005.
-
(2005)
Proc. PADS '05
, pp. 199-206
-
-
Zou, C.C.1
Towsley, D.2
Gong, W.3
Cai, S.4
-
5
-
-
12244311689
-
A taxonomy of computer worms
-
WORM '03:, ACM Press
-
N. Weaver, V. Paxson, S. Staniford, and R. Cunningham, "A taxonomy of computer worms, " WORM '03: Proc. 2003 ACM Workshop on Rapid Malcode, pp. 11-18, ACM Press, 2003.
-
(2003)
Proc. 2003 ACM Workshop on Rapid Malcode
, pp. 11-18
-
-
Weaver, N.1
Paxson, V.2
Staniford, S.3
Cunningham, R.4
-
6
-
-
34547181258
-
Search worms
-
WORM '06
-
N. Provos, J. McClain, and K. Wang, "Search worms, " WORM '06: Proc. 4th ACM Workshop on Recurring Malcode, pp. 1-8, 2006.
-
(2006)
Proc. 4th ACM Workshop on Recurring Malcode
, pp. 1-8
-
-
Provos, N.1
McClain, J.2
Wang, K.3
-
7
-
-
51949093835
-
Botnet research survey
-
Washington D. C.
-
Z. Zhu, G. Lu, Y. Chen, Z. J. Fu, P. Roberts, and K. Han, "Botnet research survey, " Proc. COMPSAC '08, pp. 967-972, Washington D. C., 2008.
-
(2008)
Proc. COMPSAC '08
, pp. 967-972
-
-
Zhu, Z.1
Lu, G.2
Chen, Y.3
Fu, Z.J.4
Roberts, P.5
Han, K.6
-
8
-
-
38149093160
-
Emulation-based detection of non-self-contained polymorphic shellcode
-
M. Polychronakis, K. G. Anagnostakis, and E. P. Markatos, "Emulation-based detection of non-self-contained polymorphic shellcode, " RAID, pp. 87-106, 2007.
-
(2007)
RAID
, pp. 87-106
-
-
Polychronakis, M.1
Anagnostakis, K.G.2
Markatos, E.P.3
-
9
-
-
34748920757
-
Analyzing network traffic to detect self-decrypting exploit code
-
Q. Zhang, D. S. Reeves, P. Ning, and S. P. Iyer, "Analyzing network traffic to detect self-decrypting exploit code, " Proc. 2nd ACM Symposium on Information, Computer and Communications Security, pp. 4-12, 2007.
-
(2007)
Proc. 2nd ACM Symposium on Information, Computer and Communications Security
, pp. 4-12
-
-
Zhang, Q.1
Reeves, D.S.2
Ning, P.3
Iyer, S.P.4
-
10
-
-
33751056900
-
Towards automatic generation of vulnerability-based signatures
-
D. Brumley, J. Newsome, D. Song, H. Wang, and S. Jha, "Towards automatic generation of vulnerability-based signatures, " 2006 IEEE Symposium on Security and Privacy, pp. 2-16, 2006.
-
(2006)
2006 IEEE Symposium on Security and Privacy
, pp. 2-16
-
-
Brumley, D.1
Newsome, J.2
Song, D.3
Wang, H.4
Jha, S.5
-
11
-
-
77953145744
-
A survey of internet worm detection and containment
-
P. Li, M. Salour, and X. Su, "A survey of internet worm detection and containment, " IEEE Communications Surveys and Tutorials, vol. 10, no. 1, pp. 20-35, 2008.
-
(2008)
IEEE Communications Surveys and Tutorials
, vol.10
, Issue.1
, pp. 20-35
-
-
Li, P.1
Salour, M.2
Su, X.3
-
12
-
-
84991765629
-
Automated worm fingerprinting
-
S. Singh, C. Estan, G. Varghese, and S. Savage, "Automated worm fingerprinting, " 6th USENIX OSDI, 2004.
-
(2004)
6th USENIX OSDI
-
-
Singh, S.1
Estan, C.2
Varghese, G.3
Savage, S.4
-
14
-
-
35048867316
-
On the design and use of internet sinks for network abuse monitoring
-
V. Yegneswaran, P. Barford, and D. Plonka, "On the design and use of internet sinks for network abuse monitoring, " Proc. RAID, pp. 146-165, 2004.
-
(2004)
Proc. RAID
, pp. 146-165
-
-
Yegneswaran, V.1
Barford, P.2
Plonka, D.3
-
15
-
-
35048879637
-
Honeystat: Local worm detection using honeypots
-
D. Dagon, X. Qin, G. Gu, W. Lee, J. Grizzard, J. Levine, and H. Owen, "Honeystat: Local worm detection using honeypots, " RAID, pp. 39-58, 2004.
-
(2004)
RAID
, pp. 39-58
-
-
Dagon, D.1
Qin, X.2
Gu, G.3
Lee, W.4
Grizzard, J.5
Levine, J.6
Owen, H.7
-
17
-
-
33750944389
-
Honids: Enhancing honeypot system with intrusion detection models
-
Y. Tang, H. P. Hu, X. C. Lu, and J. Wang, "Honids: Enhancing honeypot system with intrusion detection models, " Fourth IEEE International Workshop on Information Assurance (IWIA'06), pp. 135-143, 2006.
-
(2006)
Fourth IEEE International Workshop on Information Assurance (IWIA'06)
, pp. 135-143
-
-
Tang, Y.1
Hu, H.P.2
Lu, X.C.3
Wang, J.4
-
18
-
-
33846316416
-
Scriptgen: An automated script generation tool for honeyd
-
ACSAC '05
-
C. Leita, K. Mermoud, and M. Dacier, "Scriptgen: An automated script generation tool for honeyd, " ACSAC '05: Proc. 21st Annual Computer Security Applications Conference, pp. 203-214, 2005.
-
(2005)
Proc. 21st Annual Computer Security Applications Conference
, pp. 203-214
-
-
Leita, C.1
Mermoud, K.2
Dacier, M.3
-
19
-
-
33750376717
-
Scalability, fidelity, and containment in the potemkin virtual honeyfarm
-
M. Vrable, J. Ma, J. Chen, D. Moore, E. Vandekieft, A. C. Snoeren, G. M. Voelker, and S. Savage, "Scalability, fidelity, and containment in the potemkin virtual honeyfarm, " SIGOPS Oper. Syst. Rev., vol. 39, no. 5, pp. 148-162, 2005.
-
(2005)
SIGOPS Oper. Syst. Rev.
, vol.39
, Issue.5
, pp. 148-162
-
-
Vrable, M.1
Ma, J.2
Chen, J.3
Moore, D.4
Vandekieft, E.5
Snoeren, A.C.6
Voelker, G.M.7
Savage, S.8
-
20
-
-
27544498978
-
Polygraph: Automatically generating signatures for polymorphic worms
-
J. Newsome, B. Karp, and D. Song, "Polygraph: Automatically generating signatures for polymorphic worms, " 2005 IEEE Symposium on Security and Privacy, pp. 226-241, 2005.
-
(2005)
2005 IEEE Symposium on Security and Privacy
, pp. 226-241
-
-
Newsome, J.1
Karp, B.2
Song, D.3
-
21
-
-
0037661195
-
Network traffic anomaly detection based on packet bytes
-
SAC '03
-
M. V. Mahoney, "Network traffic anomaly detection based on packet bytes, " SAC '03: Proc. 2003 ACM Symposium on Applied Computing, pp. 346-350, 2003.
-
(2003)
Proc. 2003 ACM Symposium on Applied Computing
, pp. 346-350
-
-
Mahoney, M.V.1
-
22
-
-
33750335757
-
Anagram: A content anomaly detector resistant to mimicry attack
-
K. Wang, J. J. Parekh, and S. J. Stolfo, "Anagram: A content anomaly detector resistant to mimicry attack, " RAID, pp. 226-248, 2006.
-
(2006)
RAID
, pp. 226-248
-
-
Wang, K.1
Parekh, J.J.2
Stolfo, S.J.3
-
24
-
-
0036038437
-
Service specific anomaly detection for network intrusion detection
-
SAC '02
-
C. Krügel, T. Toth, and E. Kirda, "Service specific anomaly detection for network intrusion detection, " SAC '02: Proc. 2002 ACM Symposium on Applied Computing, pp. 201-208, 2002.
-
(2002)
Proc. 2002 ACM Symposium on Applied Computing
, pp. 201-208
-
-
Krügel, C.1
Toth, T.2
Kirda, E.3
-
25
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
J. Newsome and D. Song, "Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software, " 12th Annual Network and Distributed System Security Symposium, 2005.
-
(2005)
12th Annual Network and Distributed System Security Symposium
-
-
Newsome, J.1
Song, D.2
-
26
-
-
33745803872
-
Automatic diagnosis and response to memory corruption vulnerabilities
-
J. Xu, P. Ning, C. Kil, Y. Zhai, and C. Bookholt, "Automatic diagnosis and response to memory corruption vulnerabilities, " 12th ACM Conference on Computer and Communications Security, pp. 223-234, 2005.
-
(2005)
12th ACM Conference on Computer and Communications Security
, pp. 223-234
-
-
Xu, J.1
Ning, P.2
Kil, C.3
Zhai, Y.4
Bookholt, C.5
-
27
-
-
33745800070
-
Fast and automated generation of attack signatures: A basis for building self-protecting servers
-
Z. Liang and R. Sekar, "Fast and automated generation of attack signatures: A basis for building self-protecting servers, " 12th ACM Conference on Computer and Communications Security, pp. 213-222, 2005.
-
(2005)
12th ACM Conference on Computer and Communications Security
, pp. 213-222
-
-
Liang, Z.1
Sekar, R.2
-
28
-
-
34547261222
-
Packet vaccine: Black-box exploit detection and signature generation
-
X. F. Wang, Z. Li, J. Xu, M. K. Reiter, C. Kil, and J. Y. Choi, "Packet vaccine: Black-box exploit detection and signature generation, " 13th ACM Conference on Computer and Communications Security, pp. 37-46, 2006.
-
(2006)
13th ACM Conference on Computer and Communications Security
, pp. 37-46
-
-
Wang, X.F.1
Li, Z.2
Xu, J.3
Reiter, M.K.4
Kil, C.5
Choi, J.Y.6
-
29
-
-
33751064824
-
Hamsa: Fast signature generation for zero-day polymorphic worms with provable attack resilience
-
Z. Li, M. Sanghi, Y. Chen, M. Y. Kao, and B. Chavez, "Hamsa: Fast signature generation for zero-day polymorphic worms with provable attack resilience, " 2006 IEEE Symposium on Security and Privacy, 2006.
-
(2006)
2006 IEEE Symposium on Security and Privacy
-
-
Li, Z.1
Sanghi, M.2
Chen, Y.3
Kao, M.Y.4
Chavez, B.5
-
31
-
-
34250362690
-
Daw: A distributed antiworm system
-
S. Chen and Y. Tang, "Daw: A distributed antiworm system, " IEEE Trans. Parallel Distrib. Syst., vol. 18, no. 7, pp. 893-906, 2007.
-
(2007)
IEEE Trans. Parallel Distrib. Syst.
, vol.18
, Issue.7
, pp. 893-906
-
-
Chen, S.1
Tang, Y.2
-
32
-
-
85081770459
-
The Internet motion sensor: A distributed blackhole monitoring system
-
M. Bailey, E. Cooke, F. Jahanian, J. Nazario, and D. Watson, "The Internet motion sensor: A distributed blackhole monitoring system, " Proc. 12th ISOC Symposium on Network and Distributed Systems Security (NDSS), pp. 167-179, 2005.
-
(2005)
Proc. 12th ISOC Symposium on Network and Distributed Systems Security (NDSS)
, pp. 167-179
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Nazario, J.4
Watson, D.5
-
34
-
-
33750904745
-
Implications of peer-to-peer networks on worm attacks and defenses
-
J. K. K. Lakshminarayanan, "Implications of peer-to-peer networks on worm attacks and defenses, " Tech. Rep., UCB, 2003.
-
(2003)
Tech. Rep., UCB
-
-
Lakshminarayanan, J.K.K.1
-
35
-
-
38949106589
-
Modeling passive worm propagation in peer-to-peer system
-
J. Ma, X. Chen, and G. Xiang, "Modeling passive worm propagation in peer-to-peer system, " International Conference on Computational Intelligence and Security, pp. 1129-1132, 2006.
-
(2006)
International Conference on Computational Intelligence and Security
, pp. 1129-1132
-
-
Ma, J.1
Chen, X.2
Xiang, G.3
-
36
-
-
34547593039
-
Research of a potential worm propagation model based on pure p2p principle
-
Y. Yao, X. Luo, F. Gao, and S. Ai, "Research of a potential worm propagation model based on pure p2p principle, " ICCT '06: International Conference on Communication Technology, pp. 1-4, 2006.
-
(2006)
ICCT '06: International Conference on Communication Technology
, pp. 1-4
-
-
Yao, Y.1
Luo, X.2
Gao, F.3
Ai, S.4
-
37
-
-
39049092655
-
Epidemiological modeling of peer-topeer viruses and pollution
-
R. Thommes and M. Coates, "Epidemiological modeling of peer-topeer viruses and pollution, " INFOCOM'06, 2006.
-
(2006)
INFOCOM'06
-
-
Thommes, R.1
Coates, M.2
-
39
-
-
77950308835
-
Modeling and analysis of self-stopping bt worms using dynamic hit list in p2p networks
-
J. Luo, B. Xiao, G. Liu, Q. Xiao, and S. Zhou, "Modeling and analysis of self-stopping bt worms using dynamic hit list in p2p networks, " SSN'09, 2009.
-
(2009)
SSN'09
-
-
Luo, J.1
Xiao, B.2
Liu, G.3
Xiao, Q.4
Zhou, S.5
-
40
-
-
33746562303
-
A first look at peer-to-peer worms: Threats and defenses
-
L. Zhou, L. Zhang, F. Mcsherry, N. Immorlica, M. Costa, and S. Chien, "A first look at peer-to-peer worms: Threats and defenses, " Proc. IPTPS'05, 2005.
-
(2005)
Proc. IPTPS'05
-
-
Zhou, L.1
Zhang, L.2
Mcsherry, F.3
Immorlica, N.4
Costa, M.5
Chien, S.6
-
41
-
-
77950330952
-
Verme: Worm containment in peer-to-peer overlays
-
IPTPS'07
-
F. Freitas, R. Rodrigues, C. Ribeiro, P. Ferreira, and L. Rodrigues, "Verme: Worm containment in peer-to-peer overlays, " IPTPS'07: Proc. 6th International Workshop on Peer-to-Peer Systems, 2007.
-
(2007)
Proc. 6th International Workshop on Peer-to-Peer Systems
-
-
Freitas, F.1
Rodrigues, R.2
Ribeiro, C.3
Ferreira, P.4
Rodrigues, L.5
-
42
-
-
33947239947
-
Breaking monocultures in p2p networks for worm prevention
-
Y. Zhou, Z. Wu, H. Wang, J. Zhong, Y. Feng, and Z. Zhu, "Breaking monocultures in p2p networks for worm prevention, " Proc. Fifth International Conference on Machine Learning and Cybernetics, 2006.
-
(2006)
Proc. Fifth International Conference on Machine Learning and Cybernetics
-
-
Zhou, Y.1
Wu, Z.2
Wang, H.3
Zhong, J.4
Feng, Y.5
Zhu, Z.6
-
43
-
-
49249092068
-
A waw model of p2pbased anti-worm
-
Y. Yao, L. Wu, F. Gao, W. Yang, and G. Yu, "A waw model of p2pbased anti-worm, " ICNSC'08: IEEE International Conference on Networking, Sensing and Control, pp. 1131-1136, 2008.
-
(2008)
ICNSC'08: IEEE International Conference on Networking, Sensing and Control
, pp. 1131-1136
-
-
Yao, Y.1
Wu, L.2
Gao, F.3
Yang, W.4
Yu, G.5
-
45
-
-
17444431614
-
Worm propagation and generic attacks
-
E. Levy, "Worm propagation and generic attacks, " IEEE Security and Privacy, vol. 3, no. 2, pp. 63-65, 2005.
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.2
, pp. 63-65
-
-
Levy, E.1
-
46
-
-
14944350556
-
Email virus propagation modeling and analysis
-
Umass ECE Dept.
-
C. Zou, D. Towsley, and W. Gong, "Email virus propagation modeling and analysis, " Tech. Rep., Umass ECE Dept., 2003.
-
(2003)
Tech. Rep.
-
-
Zou, C.1
Towsley, D.2
Gong, W.3
-
48
-
-
35048870863
-
Random graphs with arbitrary degree distribution and their applications
-
Santa Fe Institute
-
M. E. J. Newman, S. H. Strogatz, and D. J. Watts, "Random graphs with arbitrary degree distribution and their applications, " Tech. Rep., Santa Fe Institute, 2000.
-
(2000)
Tech. Rep.
-
-
Newman, M.E.J.1
Strogatz, S.H.2
Watts, D.J.3
-
49
-
-
37649029105
-
Email networks and the spread of computer viruses
-
M. Newman, S. Forrest, and J. Balthrop, "Email networks and the spread of computer viruses, " Phys. Rev. E, vol. 66, pp. 200-202, 2002.
-
(2002)
Phys. Rev. E
, vol.66
, pp. 200-202
-
-
Newman, M.1
Forrest, S.2
Balthrop, J.3
-
50
-
-
14944376454
-
A study of massmailing worms
-
C. Wong, S. Bielski, J. M. McCune, and C. Wang, "A study of massmailing worms, " WORM' 04: Proc. ACM Workshop on Rapid Malcode, pp. 1-10, 2004.
-
(2004)
WORM' 04: Proc. ACM Workshop on Rapid Malcode
, pp. 1-10
-
-
Wong, C.1
Bielski, S.2
McCune, J.M.3
Wang, C.4
-
51
-
-
14944372409
-
Act: Attachment chain tracing scheme for email virus detection and control
-
J. Xiong, "Act: Attachment chain tracing scheme for email virus detection and control, " WORM' 04: Proc. ACM Workshop on Rapid Malcode, 2004.
-
(2004)
WORM' 04: Proc. ACM Workshop on Rapid Malcode
-
-
Xiong, J.1
-
52
-
-
70450140870
-
Analyzing behaviorial features for email classification
-
Stanford University, July
-
S. Martin, A. Sewani, B. Nelson, K. Chen, and A. D. Joseph, "Analyzing behaviorial features for email classification, " Proc. CEAS '05, Stanford University, July 2005.
-
(2005)
Proc. CEAS '05
-
-
Martin, S.1
Sewani, A.2
Nelson, B.3
Chen, K.4
Joseph, A.D.5
-
53
-
-
34547232533
-
Signature metrics for accurate and automated worm detection
-
P. Gopalan, K. Jamieson, P. Mavrommatis, and M. Poletto, "Signature metrics for accurate and automated worm detection, " WORM'06: Proc. ACM Workshop on Rapid Malcode, 2006.
-
(2006)
WORM'06: Proc. ACM Workshop on Rapid Malcode
-
-
Gopalan, P.1
Jamieson, K.2
Mavrommatis, P.3
Poletto, M.4
-
54
-
-
29244474373
-
Detecting mass-mailing worm infected hosts by mining dns traffic data
-
K. Ishibashi, T. Toyono, and K. Toyama, "Detecting mass-mailing worm infected hosts by mining dns traffic data, " SIGCOMM05 Workshops, 2005.
-
(2005)
SIGCOMM05 Workshops
-
-
Ishibashi, K.1
Toyono, T.2
Toyama, K.3
-
56
-
-
24644513663
-
Feedback email worm defense system for enterprise networks
-
Umass ECE Dept.
-
C. C. Zou, W. Gong, and D. Towsley, "Feedback email worm defense system for enterprise networks, " Tech. Rep., Umass ECE Dept., 2004.
-
(2004)
Tech. Rep.
-
-
Zou, C.C.1
Gong, W.2
Towsley, D.3
-
57
-
-
50049084766
-
An architecture for an email worm prevention system
-
T. M. Mahmoud, A. S. Ehab, and B. Raouf, "An architecture for an email worm prevention system, " Securecomm and Workshops, pp. 1-9, 2006.
-
(2006)
Securecomm and Workshops
, pp. 1-9
-
-
Mahmoud, T.M.1
Ehab, A.S.2
Raouf, B.3
-
62
-
-
85084096599
-
Catching instant messaging worms with change-point detection techniques
-
G. Yan, Z. Xiao, and S. Eidenbenz, "Catching instant messaging worms with change-point detection techniques, " Proc. 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, pp. 1-10, 2008.
-
(2008)
Proc. 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats
, pp. 1-10
-
-
Yan, G.1
Xiao, Z.2
Eidenbenz, S.3
-
63
-
-
77950302925
-
The feasibility of p2p technique used in im worm
-
Computer Science Dept., Blekinge Institute of Tech.
-
G. Zhang and F. M. Kugblenu, "The feasibility of p2p technique used in im worm, " Tech. Rep., Computer Science Dept., Blekinge Institute of Tech., 2006.
-
(2006)
Tech. Rep.
-
-
Zhang, G.1
Kugblenu, F.M.2
|