메뉴 건너뛰기




Volumn , Issue , 2011, Pages 99-106

XMiner: Nip the zero day exploits in the bud

Author keywords

Feature extraction; Machine learning; Network security; Vulnerability exploits detection

Indexed keywords

DATA SETS; DECISION TREE CLASSIFIERS; DETECTION SYSTEM; DIFFERENT PROTOCOLS; DISCRIMINATIVE FEATURES; LIGHTWEIGHT DESIGN; MACHINE-LEARNING; MALICIOUS ACTIVITIES; MALICIOUS PACKETS; MEMORY RESOURCES; NETWORK MESSAGES; REAL TIME; REAL-WORLD DATASETS; REMOTE SERVERS; RESOURCECONSTRAINED DEVICES; SMART PHONES; VULNERABILITY EXPLOITS DETECTION;

EID: 80055006379     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NCA.2011.21     Document Type: Conference Paper
Times cited : (4)

References (41)
  • 1
    • 21844456680 scopus 로고    scopus 로고
    • Shield: Vulnerability-driven network filters for preventing known vulnerability exploits
    • DOI 10.1145/1030194.1015489, Computer Communication Review - Proceedings of ACM SIGCOMM 2004: Conference on Computer Communications
    • H. Wang, C. Guo, D. Simon, and A. Zugenmaier, "Shield: Vulnerability-driven network filters for preventing known vulnerability exploits," in ACM SIGCOMM Computer Communication Review, vol. 34, no. 4. ACM, 2004, pp. 193-204. (Pubitemid 40954880)
    • (2004) Computer Communication Review , vol.34 , Issue.4 , pp. 193-204
    • Wang, H.J.1    Guo, C.2    Simon, D.R.3    Zugenmaier, A.4
  • 3
    • 80055025588 scopus 로고    scopus 로고
    • January [Online]
    • "United Press International UPI," January 2009. [Online]. Available: http://www.upi.com/Top-News/2009/01/25/Virus-strikes-15-million-PCs/ UPI-19421232924206/
    • (2009) United Press International UPI
  • 4
    • 21844434512 scopus 로고    scopus 로고
    • November [Online]
    • "Microsoft Security Bulletin MS01-033," November 2003. [Online]. Available: http://www.microsoft.com/technet/treeview/default.asp?url=/ technet/security/bulletin/MS01-033.asp.
    • (2003) Microsoft Security Bulletin MS01-033
  • 5
    • 21844439815 scopus 로고    scopus 로고
    • January [Online]
    • "Microsoft security bulletin ms02-039," January 2003. [Online]. Available: http://www.microsoft.com/technet/treeview/default.asp?url=/technet/ security/bulletin/MS02-039.asp.
    • (2003) Microsoft Security Bulletin Ms02-039
  • 6
    • 2342553315 scopus 로고    scopus 로고
    • September [Online]
    • "Microsoft Security Bulletin MS03-026," September 2003. [Online]. Available: http://www.microsoft.com/technet/treeview/default.asp?url=/ technet/security/bulletin/MS03-026.asp.
    • (2003) Microsoft Security Bulletin MS03-026
  • 7
    • 21844451704 scopus 로고    scopus 로고
    • April [Online]
    • "W32. Sasser. Worm," April 2004. [Online]. Available: http://securityresponse.symantec.com/avcenter/venc/data/w32.sasser.worm.html.
    • (2004) W32. Sasser. Worm
  • 11
    • 80054976490 scopus 로고    scopus 로고
    • [Online]
    • "Remote DoS on Cisco IoS," 2009. [Online]. Available: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2867.
    • (2009) Remote dos on Cisco IoS
  • 12
    • 80054970698 scopus 로고    scopus 로고
    • [Online]
    • "Remote DoS on Asterisks SIP Server," 2007. [Online]. Available: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1306.
    • (2007) Remote dos on Asterisks SIP Server
  • 14
    • 70349735505 scopus 로고    scopus 로고
    • [Online]
    • SANS-Institute, "SANS Top-20 2007 Security Risks," 2007. [Online]. Available: http://www.sans.org/top20/
    • (2007) SANS Top-20 2007 Security Risks
  • 16
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • V. Paxson, "Bro: A system for detecting network intruders in real-time," Comput. Networks, vol. 31, no. 23, pp. 2435-2463, 1999.
    • (1999) Comput. Networks , vol.31 , Issue.23 , pp. 2435-2463
    • Paxson, V.1
  • 17
    • 80054988153 scopus 로고    scopus 로고
    • [Online]
    • "Hogwash." [Online]. Available: http://sourceforge.net/ projects/hogwash/.
    • Hogwash
  • 19
    • 80055014113 scopus 로고    scopus 로고
    • An introduction to SPIKE, the fuzzer creation kit
    • D. Aitel, "An Introduction to SPIKE, the Fuzzer Creation Kit," immunity inc. white paper, 2004.
    • (2004) Immunity Inc. White Paper
    • Aitel, D.1
  • 20
    • 77951617015 scopus 로고    scopus 로고
    • The-VoIP-Network, "VoIP Market Trends," 2008, http://www.the-voip-network.com/voipmarket.html.
    • (2008) VoIP Market Trends
  • 24
    • 80055001605 scopus 로고    scopus 로고
    • Space dive: A distributed intrusion detection system for voice-over-IP environments
    • V. Apte, Y. Wu, S. Bagchi, S. Garg, and N. Singh, "Space Dive: A Distributed Intrusion Detection System for Voice-over-IP Environments," DSN 2006, p. 222.
    • DSN 2006 , pp. 222
    • Apte, V.1    Wu, Y.2    Bagchi, S.3    Garg, S.4    Singh, N.5
  • 25
    • 33947123970 scopus 로고    scopus 로고
    • A framework for protecting a SIP-based infrastructure against malformed message attacks
    • DOI 10.1016/j.comnet.2006.11.014, PII S1389128606003458
    • D. Geneiatakis, G. Kambourakis, C. Lambrinoudakis, T. Dagiuklas, and S. Gritzalis, "A framework for protecting a SIP-based infrastructure against malformed message attacks," Computer Networks, vol. 51, no. 10, pp. 2580-2593, 2007. (Pubitemid 46678900)
    • (2007) Computer Networks , vol.51 , Issue.10 , pp. 2580-2593
    • Geneiatakis, D.1    Kambourakis, G.2    Lambrinoudakis, C.3    Dagiuklas, T.4    Gritzalis, S.5
  • 26
    • 34547396634 scopus 로고    scopus 로고
    • Binpac: A yacc for writing application protocol parsers
    • DOI 10.1145/1177080.1177119, Proceedings of the 2006 ACM SIGCOMM Internet Measurement Conference, IMC 2006
    • R. Pang, V. Paxson, R. Sommer, and L. Peterson, "binpac: A yacc for writing application protocol parsers," in Proceedings of the 6th ACM SIGCOMM conference on Internet measurement. ACM, NY, USA, 2006, pp. 289-300. (Pubitemid 47165611)
    • (2006) Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC , pp. 289-300
    • Pang, R.1    Paxson, V.2    Sommer, R.3    Peterson, L.4
  • 29
    • 33846369107 scopus 로고    scopus 로고
    • Learning DFA representations of HTTP for protecting web applications
    • DOI 10.1016/j.comnet.2006.09.016, PII S1389128606002416, From Intrusion Detection to Self-Protection
    • K. Ingham, A. Somayaji, J. Burge, and S. Forrest, "Learning DFA representations of HTTP for protecting web applications," Computer Networks, vol. 51, no. 5, pp. 1239-1255, 2007. (Pubitemid 46131444)
    • (2007) Computer Networks , vol.51 , Issue.5 , pp. 1239-1255
    • Ingham, K.L.1    Somayaji, A.2    Burge, J.3    Forrest, S.4
  • 34
    • 33750379862 scopus 로고    scopus 로고
    • Behavioral distance measurement using hidden Markov models
    • D. Gao, M. Reiter, and D. Song, "Behavioral distance measurement using hidden markov models," Lecture Notes in Computer Science, vol. 4219, p. 19, 2006.
    • (2006) Lecture Notes in Computer Science , vol.4219 , pp. 19
    • Gao, D.1    Reiter, M.2    Song, D.3
  • 35
    • 33846910249 scopus 로고    scopus 로고
    • Language models for detection of unknown attacks in network traffic
    • K. Rieck and P. Laskov, "Language models for detection of unknown attacks in network traffic," Journal in Computer Virology, vol. 2, no. 4, pp. 243-256, 2007.
    • (2007) Journal in Computer Virology , vol.2 , Issue.4 , pp. 243-256
    • Rieck, K.1    Laskov, P.2
  • 39
    • 80054994110 scopus 로고    scopus 로고
    • INFIGO-Information-Security, "FTP Fuzzer," http://www.infigo. hr/files/.
    • FTP Fuzzer


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.