메뉴 건너뛰기




Volumn , Issue , 2011, Pages 57-64

Detecting infection onset with behavior-based policies

Author keywords

[No Author keywords available]

Indexed keywords

BEHAVIOR-BASED; EXPERIMENTAL EVALUATION; FALSE ALARMS; FALSE POSITIVE RATES; HOST-BASED; MALICIOUS CODES; MALWARES; NETWORKED APPLICATIONS; PROCESS EXECUTION; REAL-TIME PROTECTION; SYSTEM RESOURCES; USER ACTION; USER STUDY;

EID: 81055138290     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICNSS.2011.6059960     Document Type: Article
Times cited : (23)

References (39)
  • 2
    • 55649089217 scopus 로고    scopus 로고
    • Automated containment of rootkits attacks
    • A. Baliga, L. Iftode, and X. Chen. Automated containment of rootkits attacks. Computers & Security, 27(7-8):323-334, 2008.
    • (2008) Computers & Security , vol.27 , Issue.7-8 , pp. 323-334
    • Baliga, A.1    Iftode, L.2    Chen, X.3
  • 5
  • 12
    • 60349104471 scopus 로고    scopus 로고
    • Alcatraz: An isolated environment for experimenting with untrusted software
    • January
    • Z. Liang, W. Sun, V. N. Venkatakrishnan, and R. Sekar. Alcatraz: An isolated environment for experimenting with untrusted software. ACM Trans. Inf. Syst. Secur., 12:14:1-14:37, January 2009.
    • (2009) ACM Trans. Inf. Syst. Secur. , vol.12 , pp. 141-1437
    • Liang, Z.1    Sun, W.2    Venkatakrishnan, V.N.3    Sekar, R.4
  • 16
    • 81055156354 scopus 로고    scopus 로고
    • www.malwaredomainlist.com.
  • 17
    • 81055129346 scopus 로고    scopus 로고
    • www.malwareurl.com.
  • 25
    • 81055129342 scopus 로고    scopus 로고
    • The user is not the enemy: Fighting malware by tracking user intentions
    • September
    • J. Shirley and D. Evans. The user is not the enemy: Fighting malware by tracking user intentions. In Proceedings of New Security Paradigms Workshop (NSPW), pages 22-25, September 2008.
    • (2008) Proceedings of New Security Paradigms Workshop (NSPW) , pp. 22-25
    • Shirley, J.1    Evans, D.2
  • 26
    • 78751553661 scopus 로고    scopus 로고
    • skape. Understanding windows shellcode. http://www.nologin.org/Downloads/ Papers/win32-shellcode.pdf, 2003.
    • (2003) Understanding Windows Shellcode
  • 27
    • 84883368527 scopus 로고    scopus 로고
    • skape. Metasploit's meterpreter. http://www.nologin.org/Downloads/Papers/ meterpreter.pdf, 2004.
    • (2004) Metasploit's Meterpreter
  • 31
    • 70350432796 scopus 로고    scopus 로고
    • Automated spyware collection and analysis
    • P. Samarati, M. Yung, F. Martinelli, and C. A. Ardagna, editors, Springer
    • A. Stamminger, C. Kruegel, G. Vigna, and E. Kirda. Automated spyware collection and analysis. In P. Samarati, M. Yung, F. Martinelli, and C. A. Ardagna, editors, ISC, volume 5735 of Lecture Notes in Computer Science, pages 202-217. Springer, 2009.
    • (2009) ISC, Volume 5735 of Lecture Notes in Computer Science , pp. 202-217
    • Stamminger, A.1    Kruegel, C.2    Vigna, G.3    Kirda, E.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.