메뉴 건너뛰기




Volumn 8, Issue 3, 2011, Pages 377-390

Modeling and detection of Camouflaging Worm

Author keywords

anomaly detection; camouflage; Worm

Indexed keywords

ANOMALY DETECTION; CAMOUFLAGE; COMPUTER CRIME; FREQUENCY DOMAIN ANALYSIS; SPECTRAL DENSITY;

EID: 79952954563     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2010.13     Document Type: Article
Times cited : (49)

References (65)
  • 3
    • 79952920957 scopus 로고    scopus 로고
    • CERT, CERT/CC Advisories, http://www.cert.org/advisories/, 2010.
    • (2010) CERT/CC Advisories
  • 5
    • 79952936592 scopus 로고    scopus 로고
    • W32/MyDoom. B Virus, http://www.us-cert.gov/cas/techalerts/TA04-028A. html, 2010.
    • (2010)
  • 6
    • 79952950526 scopus 로고    scopus 로고
    • W32. Sircam. Worm@mm, http://www.symantec.com/avcenter/venc/data/w32. sircam.worm@mm.html, 2010.
    • (2010)
  • 7
    • 79952904474 scopus 로고    scopus 로고
    • Worm. ExploreZip, http://www.symantec.com/avcenter/venc/data/worm. explore.zip.html, 2010.
    • (2010)
  • 25
    • 34248995311 scopus 로고    scopus 로고
    • Modeling and simulation study of the propagation and defense of internet e-mail worm
    • Apr.-June
    • C. C. Zou, D. Towsley, and W. Gong, "Modeling and Simulation Study of the Propagation and Defense of Internet E-Mail Worm, " IEEE Trans. Dependable and Secure Computing, vol. 4, no. 2, pp. 105-118, Apr.-June 2007.
    • (2007) IEEE Trans. Dependable and Secure Computing , vol.4 , Issue.2 , pp. 105-118
    • Zou, C.C.1    Towsley, D.2    Gong, W.3
  • 31
    • 77952395098 scopus 로고    scopus 로고
    • On the trade-off between speed and resiliency of flash worms and similar malcodes
    • Oct
    • D. Ha and H. Ngo, "On the Trade-Off between Speed and Resiliency of Flash Worms and Similar Malcodes, " Proc. Fifth ACM Workshop Recurring Malcode (WORM), Oct. 2007.
    • (2007) Proc. Fifth ACM Workshop Recurring Malcode (WORM)
    • Ha, D.1    Ngo, H.2
  • 32
    • 57349091683 scopus 로고    scopus 로고
    • Improving sensor network immunity under worm attacks: A software diversity approach
    • May
    • Y. Yang, S. Zhu, and G. Cao, "Improving Sensor Network Immunity under Worm Attacks: A Software Diversity Approach, " Proc. ACM MobiHoc, May 2008.
    • (2008) Proc. ACM MobiHoc
    • Yang, Y.1    Zhu, S.2    Cao, G.3
  • 37
    • 12244279567 scopus 로고    scopus 로고
    • Learning to detect malicious executables in the wild
    • Aug
    • J. Z. Kolter and M. A. Maloof, "Learning to Detect Malicious Executables in the Wild, " Proc. 10th ACM SIGKDD, Aug. 2004.
    • (2004) Proc. 10th ACM SIGKDD
    • Kolter, J.Z.1    Maloof, M.A.2
  • 40
    • 33746603312 scopus 로고    scopus 로고
    • Mining anomalies using traffic feature distribution
    • Aug
    • A. Lakhina, M. Crovella, and C. Diot, "Mining Anomalies Using Traffic Feature Distribution, " Proc. ACM SIGCOMM, Aug. 2005.
    • (2005) Proc. ACM SIGCOMM
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 45
    • 85084163246 scopus 로고    scopus 로고
    • Autograph: Toward automated, distributed worm signature detection
    • Aug
    • H. Kim and B. Karp, "Autograph: Toward Automated, Distributed Worm Signature Detection, " Proc. 13th USENIX Security Symp. (SECURITY), Aug. 2004.
    • (2004) Proc. 13th USENIX Security Symp. (SECURITY)
    • Kim, H.1    Karp, B.2
  • 46
    • 33847742744 scopus 로고    scopus 로고
    • WormShield: Fast worm signature generation with distributed fingerprint aggregation
    • DOI 10.1109/TDSC.2007.1000
    • M. Cai, K. Hwang, J. Pan, and C. Papadopoulos, "Wormshield: Fast Worm Signature Generation with Distributed Fingerprint Aggregation, " IEEE Trans. Dependable and Secure Computing, vol. 4, no. 2, pp. 88-104, Apr.-June 2007. (Pubitemid 46788336)
    • (2007) IEEE Transactions on Dependable and Secure Computing , vol.4 , Issue.2 , pp. 88-104
    • Cai, M.1    Hwang, K.2    Pan, J.3    Papadopoulos, C.4
  • 53
    • 79952963637 scopus 로고    scopus 로고
    • MetaPHOR, http://securityresponse.symantec.com/avcenter/venc/data/w32. simile.html, 2010.
    • (2010)
  • 54
    • 77956173789 scopus 로고    scopus 로고
    • Zmist opportunities
    • P. Ferrie and P. S. Zmist, "Zmist Opportunities, " Virus Bull., http://www.virusbtn.com, 2010.
    • (2010) Virus Bull.
    • Ferrie, P.1    Zmist, P.S.2
  • 59
    • 51349164941 scopus 로고    scopus 로고
    • ILOC: An invisible localization attack to internet threat monitoring systems
    • Apr
    • X. Wang, W. Yu, X. Fu, D. Xuan, and W. Zhao, "iloc: An Invisible Localization Attack to Internet Threat Monitoring Systems, " Proc. 27th IEEE INFOCOM, Apr. 2008.
    • (2008) Proc. 27th IEEE INFOCOM
    • Wang, X.1    Yu, W.2    Fu, X.3    Xuan, D.4    Zhao, W.5
  • 62
    • 79952973677 scopus 로고    scopus 로고
    • A schema-based model for phonemic restoration
    • Dept. of Computer Science and Eng., The State Univ., Jan
    • S. Soundararajan and D. L. Wang, "A Schema-Based Model for Phonemic Restoration, " Technical Report OSU-CISRC-1/04-TR03, Dept. of Computer Science and Eng., The State Univ., Jan. 2004.
    • (2004) Technical Report OSU-CISRC-1/04-TR03
    • Soundararajan, S.1    Wang, D.L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.