메뉴 건너뛰기




Volumn , Issue , 2008, Pages 171-183

To catch a predator: A natural language approach for eliciting malicious payloads

Author keywords

[No Author keywords available]

Indexed keywords

BOTNET; NETWORK SECURITY;

EID: 78651523935     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (22)

References (31)
  • 1
    • 85077684219 scopus 로고    scopus 로고
    • Milw0rm. See http://www.milw0rm.com/.
    • Milw0rm
  • 7
    • 85077701966 scopus 로고    scopus 로고
    • Secunia’s wordpress GBK/Big5 character set
    • CHEUNG, A. Secunia’s wordpress GBK/Big5 character set”S” SQL injection advisory. See http://secunia.com/advisories/28005/.
    • S” SQL Injection Advisory
    • Cheung, A.1
  • 15
    • 26844548971 scopus 로고    scopus 로고
    • Tech. rep., The March
    • Know your enemy: Tracking botnets. Tech. rep., The Honeynet Project and Research Alliance, March 2005. Available from http://www.honeynet.org/papers/bots/.
    • (2005) Know Your Enemy: Tracking Botnets
  • 17
    • 33750320499 scopus 로고    scopus 로고
    • Automatic handling of protocol dependencies and reaction to 0-day attacks with ScriptGen based honeypots
    • D. Zamboni and C. Krügel, Eds., 4219 of Lecture Notes in Computer Science, Springer
    • LEITA, C., DACIER, M., AND MASSICOTTE, F. Automatic handling of protocol dependencies and reaction to 0-day attacks with ScriptGen based honeypots. In RAID(2006), D. Zamboni and C. Krügel, Eds., vol. 4219 of Lecture Notes in Computer Science, Springer, pp. 185–205.
    • (2006) RAID , pp. 185-205
    • Leita, C.1    Dacier, M.2    Massicotte, F.3
  • 19
    • 0014757386 scopus 로고
    • A general method applicable to the search for similarities in the amino acid sequence of two proteins
    • NEEDLEMAN, S. B., AND WUNSCH, C. D. A general method applicable to the search for similarities in the amino acid sequence of two proteins. Journal of Molecular Biology, 48 (1970), 443–453.
    • (1970) Journal of Molecular Biology , vol.48 , pp. 443-453
    • Needleman, S.B.1    Wunsch, C.D.2
  • 20
    • 27544498978 scopus 로고    scopus 로고
    • PolyGraph: Automatically generating signatures for polymorphic worms
    • Washington, DC, USA, IEEE Computer Society
    • NEWSOME, J., KARP, B., AND SONG, D. Polygraph: Automatically generating signatures for polymorphic worms. In Proceedings of the 2005 IEEE Symposium on Security and Privacy (Washington, DC, USA, 2005), IEEE Computer Society, pp. 226–241.
    • (2005) Proceedings of the 2005 IEEE Symposium on Security and Privacy , pp. 226-241
    • Newsome, J.1    Karp, B.2    Song, D.3
  • 21
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • NEWSOME, J., AND SONG, D. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proceedings of the Network and Distributed System Security Symposium (2005).
    • (2005) Proceedings of the Network and Distributed System Security Symposium
    • Newsome, J.1    Song, D.2
  • 29
    • 35748971032 scopus 로고    scopus 로고
    • Estimating the selectivity of TF-IDF based cosine similarity predicates
    • June
    • TATA, S., AND PATEL, J. Estimating the selectivity of TF-IDF based cosine similarity predicates. SIGMOD Record 36, 2 (June 2007).
    • (2007) SIGMOD Record 36 , pp. 2
    • Tata, S.1    Patel, J.2
  • 30
    • 0026187945 scopus 로고
    • The zero-frequency problem: Estimating the probabilities of novel events in adaptive text compression
    • WITTEN, I. H., AND BELL, T. C. The zero-frequency problem: Estimating the probabilities of novel events in adaptive text compression. IEEE Transactions on Information Theory 37, 4 (1991), 1085–1094.
    • (1991) IEEE Transactions on Information Theory , vol.37 , Issue.4 , pp. 1085-1094
    • Witten, I.H.1    Bell, T.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.