-
1
-
-
84921001603
-
-
CERT/CC Statistics, Available at
-
CERT/CC Statistics 1988-2006. Available at: http://www.cert.org/stats/ cert-stats.html
-
(1988)
-
-
-
2
-
-
0742276097
-
Inside the slammer worm
-
Moore D, Paxson V, Savage S, Shannon C, Staniford S, Weaver N. Inside the slammer worm. IEEE Security and Privacy 2003; 1(4): 33-39.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
5
-
-
85084162258
-
How to Own the Internet in your spare time
-
San Francisco, CA, USA, August
-
Staniford S, Paxson V, Weaver N. How to Own the Internet in your spare time. In Proceedings of the 11th USENIX Security Symposium, San Francisco, CA, USA, August 2002.
-
(2002)
Proceedings of the 11th USENIX Security Symposium
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
-
7
-
-
12244311689
-
A taxonomy of computer worms
-
Washington DC, USA, October
-
Weaver N, Paxson V, Staniford S, Cunningham R. A taxonomy of computer worms. In Proceedings of the First Workshop on Rapid Malcode (WORM 2003), Washington DC, USA, October 2003.
-
(2003)
Proceedings of the First Workshop on Rapid Malcode (WORM 2003)
-
-
Weaver, N.1
Paxson, V.2
Staniford, S.3
Cunningham, R.4
-
8
-
-
42549139829
-
An efficient signature-based approach for automatic detection of Internet worms over large-scale networks
-
Istanbul, Turkey, June
-
Simkhada K, Taleb T, Waizumi Y, Jamalipour A, Kato N, Nemoto Y. An efficient signature-based approach for automatic detection of Internet worms over large-scale networks. In Proceedings of IEEE International Conference on Communications (ICC 2006), Istanbul, Turkey, June 2006.
-
(2006)
Proceedings of IEEE International Conference on Communications (ICC 2006)
-
-
Simkhada, K.1
Taleb, T.2
Waizumi, Y.3
Jamalipour, A.4
Kato, N.5
Nemoto, Y.6
-
9
-
-
50949125860
-
A multi-level security based autonomic parameter selection approach for an effective and early detection of Internet worms
-
San Francisco, CA, USA, November
-
Simkhada K, Taleb T, Waizumi Y, Jamalipour A, Hashimoto K, Kato N, Nemoto Y. A multi-level security based autonomic parameter selection approach for an effective and early detection of Internet worms. In Proceedings of the IEEE Globecom 2006, San Francisco, CA, USA, November 2006.
-
(2006)
Proceedings of the IEEE Globecom 2006
-
-
Simkhada, K.1
Taleb, T.2
Waizumi, Y.3
Jamalipour, A.4
Hashimoto, K.5
Kato, N.6
Nemoto, Y.7
-
10
-
-
33846325508
-
Differencing worm flows and normal flows for automatic generation of worm signatures
-
Irvine, CA, USA, December
-
Simkhada K, Tsunoda H, Waizumi Y, Nemoto Y. Differencing worm flows and normal flows for automatic generation of worm signatures. In Proceedings of the 7th IEEE International Symposium on Multimedia (ISM2005), Irvine, CA, USA, December 2005.
-
(2005)
Proceedings of the 7th IEEE International Symposium on Multimedia (ISM2005)
-
-
Simkhada, K.1
Tsunoda, H.2
Waizumi, Y.3
Nemoto, Y.4
-
12
-
-
28044442580
-
Honey Stat: Local worm detection using honeypots
-
Sophia Antipolis, France, September
-
Dagon D, Qin X, Gu G, Lee W, Grizzard J, Levine J, Owen H. Honey Stat: local worm detection using honeypots. Recent Advances in Intrusion Detection (RAID), Sophia Antipolis, France, September 2004.
-
(2004)
Recent Advances in Intrusion Detection (RAID)
-
-
Dagon, D.1
Qin, X.2
Gu, G.3
Lee, W.4
Grizzard, J.5
Levine, J.6
Owen, H.7
-
13
-
-
33646048960
-
Honeycomb-creating intrusion detection signatures using honeypots
-
Cambridge, MA, USA, November
-
Kreibich C, Crowcroft J. Honeycomb-creating intrusion detection signatures using honeypots. In Proceedings of the 2nd Workshop on Hot Topics in Networks (Hot-Nets-II), Cambridge, MA, USA, November 2003.
-
(2003)
Proceedings of the 2nd Workshop on Hot Topics in Networks (Hot-Nets-II)
-
-
Kreibich, C.1
Crowcroft, J.2
-
14
-
-
0034838197
-
Data mining methods for detection of new malicious executables
-
Oakland, CA, USA, May
-
Schultz MG, Eskin E, Zadok E. Data mining methods for detection of new malicious executables. IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 2001.
-
(2001)
IEEE Symposium on Security and Privacy
-
-
Schultz, M.G.1
Eskin, E.2
Zadok, E.3
-
15
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
Alexandria, VA, USA, February
-
Newsome J, Song D. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proceedings of the 12th Annual Network and Distributed System Security Symposium, Alexandria, VA, USA, February 2005.
-
(2005)
Proceedings of the 12th Annual Network and Distributed System Security Symposium
-
-
Newsome, J.1
Song, D.2
-
16
-
-
0036147522
-
Improving security using extensible lightweight static analysis
-
January/February
-
Evans D, Larochelle D. Improving security using extensible lightweight static analysis. IEEE Software January/February 2002, pp. 42-51.
-
(2002)
IEEE Software
, pp. 42-51
-
-
Evans, D.1
Larochelle, D.2
-
17
-
-
85009448253
-
Point Guard: Protecting pointers from buffer overflow vulnerabilities
-
Washington DC, USA, August
-
Cowan C, Beattie S, Johansen J, Wagle P. Point Guard: protecting pointers from buffer overflow vulnerabilities. In Proceedings of 12th USENIX Security Symposium, Washington DC, USA, August 2003.
-
(2003)
Proceedings of 12th USENIX Security Symposium
-
-
Cowan, C.1
Beattie, S.2
Johansen, J.3
Wagle, P.4
-
18
-
-
24344477123
-
Efficient contentbased detection of zero-day worms
-
Seoul, Korea, May
-
Akritidis P, Anagnostakis K, Markatos EP. Efficient contentbased detection of zero-day worms. In Proceedings of IEEE International Conference on Communications (ICC 2005), Seoul, Korea, May 2005.
-
(2005)
Proceedings of IEEE International Conference on Communications (ICC 2005)
-
-
Akritidis, P.1
Anagnostakis, K.2
Markatos, E.P.3
-
19
-
-
85084163246
-
Autograph: Toward automated, distributed worm signature detection
-
San Diego, CA, August
-
Kim H, Karp B. Autograph: toward automated, distributed worm signature detection. In Proceedings of 13th USENIX Security Symposium, San Diego, CA, August 2004.
-
(2004)
Proceedings of 13th USENIX Security Symposium
-
-
Kim, H.1
Karp, B.2
-
20
-
-
14844309952
-
The Early-Bird system for real-time detection of unknown worms
-
Technical Report CS2003-0761, University of California, San Diego, August
-
Singh S, Estan C, Varghese G, Savage S. The Early-Bird system for real-time detection of unknown worms. Technical Report CS2003-0761, University of California, San Diego, August 2003.
-
(2003)
-
-
Singh, S.1
Estan, C.2
Varghese, G.3
Savage, S.4
-
21
-
-
27544498978
-
Polygraph: Automatically generating signatures for polymorphic worms
-
Oakland, CA, USA, May
-
Newsome J, Karp B, Song D. Polygraph: automatically generating signatures for polymorphic worms. In IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 2005.
-
(2005)
IEEE Symposium on Security and Privacy
-
-
Newsome, J.1
Karp, B.2
Song, D.3
-
22
-
-
84944731126
-
Design, implementation and test of an email virus throttle
-
Las Vegas, NV, USA, December
-
Williamson MM. Design, implementation and test of an email virus throttle. In Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC), Las Vegas, NV, USA, December 2003.
-
(2003)
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC)
-
-
Williamson, M.M.1
-
23
-
-
84885679117
-
Vigilante: End-to-end containment of Internet worms
-
Philadelphia, PA, USA, August
-
Costa M, Crowcroft J, Castro M, Rowstron A, Zhou L, Zhang L, Barham P. Vigilante: end-to-end containment of Internet worms. In Proceedings of the 20th ACM Special Interest Group on Data Communications (SIGCOMM'05), Philadelphia, PA, USA, August 2005.
-
(2005)
Proceedings of the 20th ACM Special Interest Group on Data Communications (SIGCOMM'05)
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
24
-
-
22944492300
-
Detecting early worm propagation through packet matching
-
Technical Report ISI-TR-2004-585, USC/Information Sciences Institute, Marina del Rey, CA, USA, February
-
Chen X, Heidemann J. Detecting early worm propagation through packet matching. Technical Report ISI-TR-2004-585, USC/Information Sciences Institute, Marina del Rey, CA, USA, February 2004.
-
(2004)
-
-
Chen, X.1
Heidemann, J.2
-
25
-
-
0242624600
-
MET: An experimental system for malicious email tracking
-
Virginia Beach, VA, USA, September
-
Bhattacharya M, Hershkop S, Eskin E. MET: an experimental system for malicious email tracking. In Proceedings of the 2002 New Security Paradigms Workshop, Virginia Beach, VA, USA, September 2002.
-
(2002)
Proceedings of the 2002 New Security Paradigms Workshop
-
-
Bhattacharya, M.1
Hershkop, S.2
Eskin, E.3
-
26
-
-
84921001598
-
-
Feedback email worm defense system for enterprise networks. Technical Report TR-04-CSE-05, University of Massachusetts, April
-
Zou CC, Gong W, Towsley D. Feedback email worm defense system for enterprise networks. Technical Report TR-04-CSE-05, University of Massachusetts, April 2004.
-
(2004)
-
-
Zou, C.C.1
Gong, W.2
Towsley, D.3
-
28
-
-
28044469549
-
The monitoring and early detection of Internet worms
-
Zou CC, Gong W, Towsley D, Gao L. The monitoring and early detection of Internet worms. IEEE/ACM Transactions on Networking 2005; 13(5): 961-974.
-
(2005)
IEEE/ACM Transactions on Networking
, vol.13
, Issue.5
, pp. 961-974
-
-
Zou, C.C.1
Gong, W.2
Towsley, D.3
Gao, L.4
-
29
-
-
85137546697
-
Global intrusion detection in the DOMINO overlay system
-
San Diego, CA, USA, February
-
Yegneswaran V, Barford P, Jha S. Global intrusion detection in the DOMINO overlay system. In Proceedings of 11th Annual Network and Distributed System Security Symposium, San Diego, CA, USA, February 2004.
-
(2004)
Proceedings of 11th Annual Network and Distributed System Security Symposium
-
-
Yegneswaran, V.1
Barford, P.2
Jha, S.3
-
30
-
-
84942121141
-
Indra: A peer-to-peer approach to network intrusion detection and prevention
-
Linz, Austria, June
-
Janakiraman R, Waldvogel M, Zhang Q. Indra: a peer-to-peer approach to network intrusion detection and prevention. In Proceedings of 2003 IEEE WETICE Workshop on Enterprise Security, Linz, Austria, June 2003.
-
(2003)
Proceedings of 2003 IEEE WETICE Workshop on Enterprise Security
-
-
Janakiraman, R.1
Waldvogel, M.2
Zhang, Q.3
-
31
-
-
84966521149
-
A metrics-based approach to intrusion detection system evaluation for distributed real-time systems
-
FL, USA, April
-
Fink GA, Chappell BL, Turner TG, O'Donoghue KF. A metrics-based approach to intrusion detection system evaluation for distributed real-time systems. In Proceedings of 10th International Workshop on Parallel and Distributed Real-Time Systems, FL, USA, April 2002.
-
(2002)
Proceedings of 10th International Workshop on Parallel and Distributed Real-Time Systems
-
-
Fink, G.A.1
Chappell, B.L.2
Turner, T.G.3
O'Donoghue, K.F.4
-
32
-
-
80053647353
-
VACCINE: War of the worms in wired and wireless networks
-
Barcelona, Spain, April
-
Tanachaiwiwat S, Helmy A. VACCINE: war of the worms in wired and wireless networks. In Proceedings of IEEE INFOCOM 2006, Barcelona, Spain, April 2006.
-
(2006)
Proceedings of IEEE INFOCOM 2006
-
-
Tanachaiwiwat, S.1
Helmy, A.2
-
33
-
-
67649802633
-
A low cost worm detection technique based on flow payload similarity
-
Barcelona, Spain, March
-
Suzuki Y, Waizumi Y, Tsunoda H, Nemoto Y. A low cost worm detection technique based on flow payload similarity. In Proceedings of Web Information Systems and Technologies, Barcelona, Spain, March 2007.
-
(2007)
Proceedings of Web Information Systems and Technologies
-
-
Suzuki, Y.1
Waizumi, Y.2
Tsunoda, H.3
Nemoto, Y.4
|