메뉴 건너뛰기




Volumn 5927 LNCS, Issue , 2009, Pages 293-307

User-assisted host-based detection of outbound malware traffic

Author keywords

[No Author keywords available]

Indexed keywords

ANALYSIS SOLUTION; ANALYSIS TOOLS; HOST-BASED; MALWARES; NETWORK CONNECTION; NETWORK SECURITY SOLUTIONS; SCALE CHARACTERIZATION; SECURITY TOOLS; STATISTICAL MEASURES; TEMPORAL PATTERN; TRAFFIC ANALYSIS; WEB ACTIVITIES; WEB APPLICATION; WEB CONTENT; WEB USAGE; WEB USAGE PATTERNS;

EID: 76549113940     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-11145-7_23     Document Type: Conference Paper
Times cited : (17)

References (32)
  • 3
    • 14844331039 scopus 로고    scopus 로고
    • Web Tap: Detecting Covert Web Traffic
    • Atluri, V, Pfitzmann, B.,McDaniel, P.D, eds, ACM, New York
    • Borders, K., Prakash, A.: Web Tap: Detecting Covert Web Traffic. In: Atluri, V., Pfitzmann, B.,McDaniel, P.D. (eds.) ACM Conference on Computer and Communications Security, pp. 110-120. ACM, New York (2004)
    • (2004) ACM Conference on Computer and Communications Security , pp. 110-120
    • Borders, K.1    Prakash, A.2
  • 4
    • 76549093829 scopus 로고    scopus 로고
    • A Community Resource for Archiving Wireless Data At Dartmouth (CRAWDAD), http://crawdad.cs.dartmouth.edu/
    • A Community Resource for Archiving Wireless Data At Dartmouth (CRAWDAD), http://crawdad.cs.dartmouth.edu/
  • 5
    • 34247253107 scopus 로고
    • Characteristics ofWWWClient-based Traces
    • Technical report, Boston, MA, USA
    • Cunha, C., Bestavros, A., Crovella, M.: Characteristics ofWWWClient-based Traces. Technical report, Boston, MA, USA (1995)
    • (1995)
    • Cunha, C.1    Bestavros, A.2    Crovella, M.3
  • 7
    • 76549120876 scopus 로고    scopus 로고
    • Georgia Tech Information Security Center October
    • Emerging Cyber Threats Report for 2009, Georgia Tech Information Security Center (October 2008)
    • (2008) Emerging Cyber Threats Report for 2009
  • 9
    • 85075837457 scopus 로고    scopus 로고
    • Botminer: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection
    • Gu, G., Perdisci, R., Zhang, J., Lee,W.: Botminer: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection. In: Proceedings of the 17th USENIX Security Symposium (2008)
    • (2008) Proceedings of the 17th USENIX Security Symposium
    • Gu, G.1    Perdisci, R.2    Zhang, J.3    Lee, W.4
  • 13
    • 76549108470 scopus 로고    scopus 로고
    • Ianelli, N., Hackworth, A.: Botnets as A Vehicle for Online Crime (2005), http://www.cert.org/archive/pdf/Botnets.pdf
    • Ianelli, N., Hackworth, A.: Botnets as A Vehicle for Online Crime (2005), http://www.cert.org/archive/pdf/Botnets.pdf
  • 15
    • 0036957872 scopus 로고    scopus 로고
    • Analysis of A Campus-wide Wireless Network
    • ACM Press, New York
    • Kotz, D., Essien, K.: Analysis of A Campus-wide Wireless Network. In: Proceedings of ACM Mobicom, pp. 107-118. ACM Press, New York (2002)
    • (2002) Proceedings of ACM Mobicom , pp. 107-118
    • Kotz, D.1    Essien, K.2
  • 20
    • 85084162270 scopus 로고    scopus 로고
    • Design and Implementation of a TCG-based Integrity Measurement Architecture
    • USENIX
    • Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and Implementation of a TCG-based Integrity Measurement Architecture. In: USENIX Security Symposium, pp. 223-238. USENIX (2004)
    • (2004) USENIX Security Symposium , pp. 223-238
    • Sailer, R.1    Zhang, X.2    Jaeger, T.3    van Doorn, L.4
  • 26
    • 76549083797 scopus 로고    scopus 로고
    • Symantec, http://www.symantec.com/index.jsp
    • Symantec
  • 28
    • 76549120207 scopus 로고    scopus 로고
    • Trusted Computing Group. Trusted platform module main specification, Part 1: Design principles, Part 2: TPM structures, Part 3: Commands. Version 1.2, Revision 62 (October 2003)
    • Trusted Computing Group. Trusted platform module main specification, Part 1: Design principles, Part 2: TPM structures, Part 3: Commands. Version 1.2, Revision 62 (October 2003)
  • 29
    • 76549117048 scopus 로고    scopus 로고
    • TCG PC Client Specific TPM Interface Specification (TIS), Version 1.2. Trusted Computing Group, http://www.trustedcomputinggroup.org/groups/pc-client/
    • TCG PC Client Specific TPM Interface Specification (TIS), Version 1.2. Trusted Computing Group, http://www.trustedcomputinggroup.org/groups/pc-client/
  • 32
    • 76549131537 scopus 로고    scopus 로고
    • User-Assisted Host-Based Detection of Outbound Malware Traffic
    • Technical report, Rutgers University October
    • Xiong, H., Malhotra, P., Stefan, D.,Wu, C., Yao, D.: User-Assisted Host-Based Detection of Outbound Malware Traffic. Technical report, Rutgers University (October 2009)
    • (2009)
    • Xiong, H.1    Malhotra, P.2    Stefan, D.3    Wu, C.4    Yao, D.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.