메뉴 건너뛰기




Volumn 34, Issue 11, 2011, Pages 1269-1282

On detecting active worms with varying scan rate

Author keywords

Anomaly detection; Varying scan rate; Worm attacks

Indexed keywords

ACTIVE WORMS; ANOMALY DETECTION; DETECTION SCHEME; DYNAMIC DECISION; DYNAMIC DETECTION; INTERNET TRACES; PERFORMANCE EVALUATION; RESEARCH EFFORTS; SCAN RATES; SECURITY THREATS; STATISTICAL FEATURES; VARYING SCAN RATE; WORM ATTACKS; WORM DETECTION;

EID: 79957686762     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2010.10.014     Document Type: Article
Times cited : (11)

References (86)
  • 4
    • 26844548971 scopus 로고    scopus 로고
    • The Honeynet Project and Research Alliance
    • The Honeynet Project and Research Alliance, Know your enemy: Tracking botnets, 2005, .
    • (2005) Know Your Enemy: Tracking Botnets
  • 8
    • 79957713766 scopus 로고    scopus 로고
    • W32/MyDoom.B Virus
    • W32/MyDoom.B Virus, .
  • 9
    • 79957779052 scopus 로고    scopus 로고
    • W32.Sircam.Worm@mm
    • W32.Sircam.Worm@mm, .
  • 10
    • 79957753383 scopus 로고    scopus 로고
    • Worm.ExploreZip
    • Worm.ExploreZip, .
  • 33
    • 79957769518 scopus 로고    scopus 로고
    • Internet Storm Center
    • SANS, Internet Storm Center, .
  • 37
    • 14344267024 scopus 로고    scopus 로고
    • Cooperative Association for Internet Data Analysis
    • Cooperative Association for Internet Data Analysis, Dynamic Graphs of the Nimda Worm, .
    • Dynamic Graphs of the Nimda Worm
  • 51
    • 79957768906 scopus 로고    scopus 로고
    • MetaPHOR
    • MetaPHOR, .
  • 59
    • 0024621174 scopus 로고
    • On estimation of entropy and mutual information of continuous distributions
    • R. Moddemeijer On estimation of entropy and mutual information of continuous distributions Signal Processing 16 3 1989 233 246
    • (1989) Signal Processing , vol.16 , Issue.3 , pp. 233-246
    • Moddemeijer, R.1
  • 60
    • 0037002475 scopus 로고    scopus 로고
    • Intrusion detection: A brief history and overview
    • R.A. Kemmerer, and G. Vigna Intrusion detection: a brief history and overview IEEE Computer 35 4 2002 27 30
    • (2002) IEEE Computer , vol.35 , Issue.4 , pp. 27-30
    • Kemmerer, R.A.1    Vigna, G.2
  • 77
    • 33746603312 scopus 로고    scopus 로고
    • Mining anomalies using traffic feature distribution
    • Philadelphia, PA, August
    • A. Lakhina, M. Crovella, C. Diot, Mining anomalies using traffic feature distribution, in: Proceedings of ACM SIGCOMM, Philadelphia, PA, August 2005.
    • (2005) Proceedings of ACM SIGCOMM
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 80
    • 14944384392 scopus 로고    scopus 로고
    • Containment of scanning worms in enterprise networks
    • S. Staniford Containment of scanning worms in enterprise networks Journal of Computer Security 2003
    • (2003) Journal of Computer Security
    • Staniford, S.1
  • 83
    • 79957705672 scopus 로고    scopus 로고
    • Trend Micro, .


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.