메뉴 건너뛰기




Volumn 7, Issue 11, 2011, Pages 1724-1728

Behaviour based worm detection and signature automation

Author keywords

Artificial Neural Networks (ANNs); Destination Source Correlation (DSC); Intrusion Detection Systems (IDSs); Network scanning; Worm detection

Indexed keywords


EID: 80053252436     PISSN: 15493636     EISSN: None     Source Type: Journal    
DOI: 10.3844/jcssp.2011.1724.1728     Document Type: Article
Times cited : (1)

References (8)
  • 3
    • 33751064824 scopus 로고    scopus 로고
    • Hamsa: Fast signature generation for zeroday polymorphicworms with provable attack resilience
    • May 21-24, Berkeley/Oakland, California
    • Li, Z., M. Sanghi, Y. Chen, M. Y. Kao and B. Chavez, 2006. Hamsa: Fast signature generation for zeroday polymorphicworms with provable attack resilience. Proceedings of the IEEE Symposium on Security and Privacy, May 21-24, Berkeley/Oakland, California, pp: 32-47.
    • (2006) Proceedings of the IEEE Symposium on Security and Privacy , pp. 32-47
    • Li, Z.1    Sanghi, M.2    Chen, Y.3    Kao, M.Y.4    Chavez, B.5
  • 4
    • 42749086128 scopus 로고    scopus 로고
    • Detection of unknown computer worms based on behavioral classification of the host
    • DOI: 10.1016/j.csda.2008.01.028
    • Moskovitch, R., Y. Elovici and L. Rokach, 2008. Detection of unknown computer worms based on behavioral classification of the host. Comput. Stat. Data Anal., 52: 4544-4566. DOI: 10.1016/j.csda.2008.01.028
    • (2008) Comput. Stat. Data Anal. , vol.52 , pp. 4544-4566
    • Moskovitch, R.1    Elovici, Y.2    Rokach, L.3
  • 5
    • 19944406146 scopus 로고    scopus 로고
    • Accurate, scalable in-network identification of p2p traffic using application signatures
    • May 17-22, New York, USA. DOI: 10.1145/988672.988742
    • Sen, S., O. Spatscheck and D. Wang, 2004. Accurate, scalable in-network identification of p2p traffic using application signatures. Proceedings of the 13th international conference on World Wide Web, May 17-22, New York, USA., pp: 512-521. DOI: 10.1145/988672.988742
    • (2004) Proceedings of the 13th international conference on World Wide Web , pp. 512-521
    • Sen, S.1    Spatscheck, O.2    Wang, D.3
  • 6
    • 80053255756 scopus 로고    scopus 로고
    • Increasing effectiveness of ids to improve security in intranet
    • DOI: 10.3844/ajassp.2005.1032.1035
    • Singh, U.K., A.K. Ramani, N.S. Chaudhari and V. Gupta, 2005. Increasing effectiveness of ids to improve security in intranet. Am. J. Applied Sci., 2: 1032-1035. DOI: 10.3844/ajassp.2005.1032.1035
    • (2005) Am. J. Applied Sci. , vol.2 , pp. 1032-1035
    • Singh, U.K.1    Ramani, A.K.2    Chaudhari, N.S.3    Gupta, V.4
  • 7
    • 83755187536 scopus 로고    scopus 로고
    • Improving worm detection with artificial neural networks through feature selection and temporal analysis techniques
    • Stopel, D., Z. Boger, R. Moskovitch, Y. Shahar and Y. Elovici, 2006. Improving worm detection with artificial neural networks through feature selection and temporal analysis techniques. Int. J. Applied Math. Comput. Sci., 1: 34-40.
    • (2006) Int. J. Applied Math. Comput. Sci. , vol.1 , pp. 34-40
    • Stopel, D.1    Boger, Z.2    Moskovitch, R.3    Shahar, Y.4    Elovici, Y.5
  • 8
    • 77956489422 scopus 로고    scopus 로고
    • An automatic application signature construction system for unknown traffic
    • DOI: 10.1002/cpe.1603
    • Wang, Y., Y. Xiang and S. Z. Yu, 2010. An automatic application signature construction system for unknown traffic. Concurrency Comput.: Practice Experience, 22: 1927-1944. DOI: 10.1002/cpe.1603
    • (2010) Concurrency Comput.: Practice Experience , vol.22 , pp. 1927-1944
    • Wang, Y.1    Xiang, Y.2    Yu, S.Z.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.