메뉴 건너뛰기




Volumn , Issue , 2011, Pages 173-178

Investigation of bypassing malware defences and malware detections

Author keywords

Anti Viruses; Bypassing malware; Honeynet; Malware defences; Penetration Testing

Indexed keywords

ANTI VIRUS; DIFFERENT ATTACKS; HONEYNET; HOST-BASED; INTERNAL NETWORK; MALWARE DETECTION; MALWARES; PENETRATION TESTING;

EID: 84856645731     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISIAS.2011.6122815     Document Type: Conference Paper
Times cited : (17)

References (16)
  • 2
    • 0347178887 scopus 로고    scopus 로고
    • Computer Security Institute. Available online at: Accessed May 2, 2011
    • R. Richardson. (2008), CSI Computer Crime & Security Survey, Computer Security Institute. Available online at: http://i.cmpnet.com/v2.gocsi.con/pdf/ CSIsurvey2008.pdf [Accessed May 2, 2011].
    • (2008) CSI Computer Crime & Security Survey
    • Richardson, R.1
  • 4
    • 84856674298 scopus 로고    scopus 로고
    • SANS Institute InfoSec Reading Room, May 7
    • M. Christiansen, Bypassing Malware Defenses," SANS Institute InfoSec Reading Room, pp. 3-4 May 7, 2010.
    • (2010) Bypassing Malware Defenses , pp. 3-4
    • Christiansen, M.1
  • 6
    • 84856629610 scopus 로고    scopus 로고
    • Panda Security. Available online at Accessed May 2, 2011
    • Panda Security. (2008). Annual Report Pandalabs 2008, Panda Security. Available online at http://pandalabs.pandasecurity.com/blogs/images/PandaLabs/20 08/12/31/Annual-Report-Pandalabs-2008-ENG.pdf [Accessed May 2, 2011].
    • (2008) Annual Report Pandalabs 2008
  • 7
    • 84856640626 scopus 로고    scopus 로고
    • Available online at Accessed April 22,2011
    • CigiCigi Online. (2010). Turkojan. Available online at http:/.www.turkojan.com/eng/ [Accessed April 22,2011].
    • (2010) CigiCigi Online
  • 8
    • 84856674298 scopus 로고    scopus 로고
    • SANS Institute InfoSecReadingRoom, May 7
    • M. Christiansen, "Bypassing Malware Defenses," SANS Institute InfoSecReadingRoom, pp. 8-10, May 7, 2010.
    • (2010) Bypassing Malware Defenses , pp. 8-10
    • Christiansen, M.1
  • 11
    • 84856675403 scopus 로고    scopus 로고
    • Available online at Accessed May 12, 2011
    • Merriam-Webster Incorporated, 2010. Dictionary and Thesaurus. Available online at http://www.merriam-webster.com/dictionary/steganoeraphy [Accessed May 12, 2011].
    • (2010) Dictionary and Thesaurus
  • 12
    • 0012109964 scopus 로고    scopus 로고
    • Honeynet Project Team, Second Edition, Addison Wesley Professional Publishers. May 27
    • Honeynet Project Team, "Know Your Enemy: Learning about Security Threats," Second Edition, Addison Wesley Professional Publishers. May 27, 2004.
    • (2004) Know Your Enemy: Learning about Security Threats
  • 16
    • 0012109964 scopus 로고    scopus 로고
    • Honeynet Project Team, Second Edition, Addison Wesley Professional Publishers. May 27
    • Honeynet Project Team, "Know Your Enemy: Learning about Security Threats," Second Edition, Addison Wesley Professional Publishers. May 27, 2004.
    • (2004) Know Your Enemy: Learning about Security Threats


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.