메뉴 건너뛰기




Volumn 2516, Issue , 2002, Pages 36-53

Detecting malicious software by monitoring anomalous windows registry accesses

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; MALWARE; MERCURY (METAL);

EID: 84958983572     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36084-0_3     Document Type: Conference Paper
Times cited : (25)

References (29)
  • 1
    • 84969402030 scopus 로고    scopus 로고
    • Aim Recovery. http://www.dark-e.com/des/software/aim/index.shtml.
  • 2
    • 84969378254 scopus 로고    scopus 로고
    • Back Orifice. http://www.cultdeadcow.com/tools/bo.html.
  • 3
    • 84969378260 scopus 로고    scopus 로고
    • BackDoor.XTCP. http://www.ntsecurity.new/Panda/Index.cfm?FuseAction=Virus&VirusID=659.
  • 4
    • 84959028485 scopus 로고    scopus 로고
    • http://binaries.faq.net.pl/security tools
    • BrowseList. http://e4gle.org/files/nttools/, http://binaries.faq.net.pl/security tools.
  • 5
    • 84969378257 scopus 로고    scopus 로고
    • Happy 99. http://www.symantex.com/qvcenter/venc/data/happy99.worm.html.
  • 6
    • 84959028487 scopus 로고    scopus 로고
    • http://home.swipenet.se/˜w-65048/hacks.htm
    • IPCrack. http://www.geocities.com/SiliconValley/Garage/3755/toolicq.html, http://home.swipenet.se/˜w-65048/hacks.htm.
  • 7
    • 84969378256 scopus 로고    scopus 로고
    • L0pht Crack. http://www.atstack.com/research/lc.
  • 8
    • 84969389966 scopus 로고    scopus 로고
    • Setup Trojan. http://www.nwinternet.com/˜pchelp/bo/setuptrojan.txt.
  • 18
    • 1642375563 scopus 로고    scopus 로고
    • Adaptive model generation: An architecture for the deployment of data minig-based intrusion detection systems
    • Andrew Honig, Andrew Howard, Eleazar Eskin, and Salvatore Stolfo. Adaptive model generation: An architecture for the deployment of data minig-based intrusion detection systems. In Data Mining for Security Applications. Kluwer, 2002.
    • (2002) Data Mining for Security Applications. Kluwer
    • Honig, A.1    Howard, R.2    Eskin, E.3    Stolfo, S.4
  • 19
    • 27144514964 scopus 로고    scopus 로고
    • Internet Engineering Task Force. Intrusion detection exchange format. In http://www.ietf.org/html.charters/idwg-charter.html, 2000.
    • (2000) Intrusion Detection Exchange Format
  • 21
    • 0002774999 scopus 로고    scopus 로고
    • Learning patterns from unix processes execution traces for intrusion detection
    • W. Lee, S. J. Stolfo, and P. K. Chan. Learning patterns from unix processes execution traces for intrusion detection. pages 50–56. AAAI Press, 1997.
    • (1997) AAAI Press , pp. 50-56
    • Lee, W.1    Stolfo, S.J.2    Chan, P.K.3
  • 24
    • 84969397286 scopus 로고    scopus 로고
    • Homepage: Macafee.Com
    • MacAfee. Homepage: macafee.com. Online publication, 2000. http://www.mcafee.com.
    • (2000) Online Publication
  • 27
    • 84969393648 scopus 로고    scopus 로고
    • Regmon for Windows NT/9x
    • SysInternals. Regmon for Windows NT/9x. Online publication, 2000. http://www.sysinternals.com/ntw2k/source/regmon.shtml.
    • (2000) Online Publication
  • 28
    • 84880174811 scopus 로고    scopus 로고
    • Detecting intrusions using system calls: Alternative data models
    • Christina Warrender, Stephanie Forrest, and Barak Pearlmutter. Detecting intrusions using system calls: alternative data models. pages 133–145. IEEE Computer Society, 1999.
    • (1999) IEEE Computer Society , pp. 133-145
    • Warrender, C.1    Forrest, S.2    Pearlmutter, B.3
  • 29
    • 0043037096 scopus 로고    scopus 로고
    • Open problems in computer virus research
    • Steve R. White. Open problems in computer virus research. In Virus Bulletin Conference, 1998.
    • (1998) Virus Bulletin Conference
    • White, S.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.