메뉴 건너뛰기




Volumn 81, Issue 2, 2010, Pages 179-205

On the infeasibility of modeling polymorphic shellcode : Re-thinking the role of learning in intrusion detection systems

Author keywords

Blending; Metrics; Polymorphism; Shellcode

Indexed keywords

CURRENT TRENDS; DUAL PROBLEM; IDS SENSORS; INTRUSION DETECTION SYSTEMS; MALICIOUS CODES; METRICS; QUANTITATIVE ANALYSIS; SECURITY SENSORS; SHELLCODE; STATISTICAL MODELS;

EID: 78049530989     PISSN: 08856125     EISSN: 15730565     Source Type: Journal    
DOI: 10.1007/s10994-009-5143-5     Document Type: Article
Times cited : (21)

References (57)
  • 2
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the stack for fun and profit
    • AlephOne
    • AlephOne (2001). Smashing the stack for fun and profit. Phrack, 7(49-14).
    • (2001) Phrack , vol.7 , pp. 49-14
  • 4
    • 78049527986 scopus 로고    scopus 로고
    • Tapion polymorphic engine
    • Bania, P. (2009). Tapion polymorphic engine. http://pb.specialised.info/ all/tapion/.
    • (2009)
    • Bania, P.1
  • 7
    • 84862209017 scopus 로고    scopus 로고
    • Address obfuscation: An efficient approach to combat a broad range of memory error exploits
    • Bhatkar, S., DuVarney, D. C., & Sekar, R. (2003). Address obfuscation: an efficient approach to combat a broad range of memory error exploits. In Proceedings of the 12th USENIX security symposium (pp. 105-120).
    • (2003) Proceedings of the 12th USENIX Security Symposium , pp. 105-120
    • Bhatkar, S.1    Duvarney, D.C.2    Sekar, R.3
  • 8
    • 78049529713 scopus 로고    scopus 로고
    • Shellforge project
    • Biondi, P. (2006). Shellforge project. http://www.secdev.org/projects/ shellforge/.
    • (2006) Biondi P.
  • 10
    • 78049528691 scopus 로고    scopus 로고
    • CERT Code red I/II worm.
    • CERT (2001). Code red I/II worm. http://www.cert.org/advisories/CA-2001- 19.html.
    • (2001)
  • 23
    • 78049529851 scopus 로고    scopus 로고
    • K2 ADMmutate documentation
    • K2 (2003). ADMmutate documentation. http://www.ktwo.ca/ADMmutate-0.8.4. tar.gz.
    • (2003)
  • 32
    • 78049528890 scopus 로고    scopus 로고
    • Metasploit Development Team Metasploit project
    • Metasploit Development Team (2006). Metasploit project. http://www.metasploit.com.
    • (2006)
  • 36
    • 77952338015 scopus 로고    scopus 로고
    • Building IA32 'Unicode-Proof' shellcodes
    • Obscou
    • Obscou (2003). Building IA32 'Unicode-Proof' shellcodes. Phrack, 11(61-11).
    • (2003) Phrack , vol.11 , pp. 61-11
  • 37
    • 78049527896 scopus 로고    scopus 로고
    • Panda Labs MPack uncovered
    • Panda Labs (2007). MPack uncovered. http://pandalabs.pandasecurity.com/.
    • (2007)
  • 39
    • 77952348035 scopus 로고    scopus 로고
    • Writing IA-32 alphanumeric shellcodes
    • Rix
    • Rix (2001). Writing IA-32 alphanumeric shellcodes. Phrack, 11(57-15).
    • (2001) Phrack , vol.11 , pp. 57-15
  • 41
    • 78049527133 scopus 로고    scopus 로고
    • SANS IISMedia Exploit
    • SANS (2004a). IISMedia Exploit. http://www.sans.org/newsletters/cva/vol2- 21.php.
    • (2004)
  • 42
    • 78049529201 scopus 로고    scopus 로고
    • SANS Santy worm
    • SANS (2004b). Santy worm. http://isc.sans.org/diary.html?date=2004-12-21.
    • (2004)
  • 43
    • 78049527303 scopus 로고    scopus 로고
    • SANS Webdav exploit
    • SANS (2004c). Webdav exploit. http://www.sans.org/resources/malwarefaq/ webdav-exploit.php.
    • (2004)
  • 44
    • 78049527803 scopus 로고    scopus 로고
    • Evading NIDS
    • Siddharth, S. (2005). Evading NIDS. http://www.securityfocus.com/infocus/ 1852.
    • (2005)
    • Siddharth, S.1
  • 47
    • 78049530482 scopus 로고    scopus 로고
    • Snort Development Team Snort project
    • Snort Development Team (2009). Snort project. http://www.snort.org/.
    • (2009)
  • 49
    • 0037269111 scopus 로고    scopus 로고
    • Reliable identification of bounded-length viruses is NP-complete
    • 10.1109/TIT.2002.806137 1966706 1063.68045
    • D. Spinellis 2003 Reliable identification of bounded-length viruses is NP-complete IEEE Transactions on Information Theory 49 1 280 284 10.1109/TIT.2002.806137 1966706 1063.68045
    • (2003) IEEE Transactions on Information Theory , vol.49 , Issue.1 , pp. 280-284
    • Spinellis, D.1
  • 50
    • 78049527932 scopus 로고    scopus 로고
    • Tcpdump
    • Tcpdump (2009). http://www.tcpdump.org.
    • (2009)
  • 53
    • 21844456680 scopus 로고    scopus 로고
    • Shield: Vulnerability-driven network filters for preventing known vulnerability exploits
    • Wang, H. J., Guo, C., Simon, D. R., & Zugenmaier, A. (2004). Shield: vulnerability-driven network filters for preventing known vulnerability exploits. In Proceedings of the ACM SIGCOMM conference (pp. 193-204).
    • (2004) Proceedings of the ACM SIGCOMM Conference , pp. 193-204
    • Wang, H.J.1    Guo, C.2    Simon, D.R.3    Zugenmaier, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.