메뉴 건너뛰기




Volumn , Issue , 2014, Pages 1063-1066

A crowdsourcing approach to protect against novel malware threats

Author keywords

collaborative intelligence; JXTA; peer To peer; windows; Worm protection

Indexed keywords

CROWDSOURCING; DECISION MAKING; DISTRIBUTED COMPUTER SYSTEMS; MALWARE; WINDOWS;

EID: 84962293469     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/TELFOR.2014.7034590     Document Type: Conference Paper
Times cited : (6)

References (42)
  • 1
    • 0041065277 scopus 로고
    • The internet worm program: An analysis
    • January
    • E. Spafford, "The internet worm program: an analysis, " SIGCOMM Comput.Commun. Rev., vol.19, pp. 17-57, January 1989.
    • (1989) SIGCOMM Comput.Commun. Rev. , vol.19 , pp. 17-57
    • Spafford, E.1
  • 3
    • 85172653912 scopus 로고    scopus 로고
    • June 24
    • M. Duigou. (2004, June 24). Project JXTA [Online]. Available: http://tools.ietf.org/html/draft-duigou-jxta-protocols-05
    • (2004) Project JXTA [Online]
    • Duigou, M.1
  • 4
    • 85172628468 scopus 로고    scopus 로고
    • Project Kenai [Online]. Available: https://jxse.kenai.com/Tutorials/Tutorials.html
    • Project Kenai [Online]
  • 7
    • 0002067431 scopus 로고    scopus 로고
    • Netstat: A network-based intrusion detection system
    • G. Vigna and R. A. Kemmerer, "Netstat: A network-based intrusion detection system, " Journal of Computer Security, vol. 7, 1999.
    • (1999) Journal of Computer Security , vol.7
    • Vigna, G.1    Kemmerer, R.A.2
  • 19
    • 34248379722 scopus 로고    scopus 로고
    • Towards scalable and robust distributed intrusion alert fusion with good load balancing
    • ACM New York, NY, USA
    • Z. Li, Y. Chen, and A. Beach, "Towards scalable and robust distributed intrusion alert fusion with good load balancing, " in Proc. 2006 SIGCOMM Workshop Large-scale Attack Defense, pp. 115-122, ACM New York, NY, USA, 2006.
    • (2006) Proc. 2006 SIGCOMM Workshop Large-scale Attack Defense , pp. 115-122
    • Li, Z.1    Chen, Y.2    Beach, A.3
  • 20
    • 0036917419 scopus 로고    scopus 로고
    • Early detection of internet worm activity by metering ICMP destination unreachable mebages
    • G. Bakos and V. Berk, "Early detection of internet worm activity by metering icmp destination unreachable mebages, " in Proc. SPIE Aerosense, 2002.
    • (2002) Proc. SPIE Aerosense
    • Bakos, G.1    Berk, V.2
  • 23
    • 0036079912 scopus 로고    scopus 로고
    • Alert correlation in a cooperative intrusion detection framework
    • F. Cuppens and A. Miege, "Alert correlation in a cooperative intrusion detection framework, " in 2002 IEEE Symp. Security and Privacy, pp. 202-215, 2002
    • (2002) 2002 IEEE Symp. Security and Privacy , pp. 202-215
    • Cuppens, F.1    Miege, A.2
  • 25
    • 71749083441 scopus 로고    scopus 로고
    • Collaborative detection of fastflux phishing domains
    • February
    • C. V. Zhou, C. Leckie and S. Karunasekera, "Collaborative detection of fastflux phishing domains, " Journal of Networks, vol. 4, pp. 75-84, February 2009.
    • (2009) Journal of Networks , vol.4 , pp. 75-84
    • Zhou, C.V.1    Leckie, C.2    Karunasekera, S.3
  • 28
    • 85084164413 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real time
    • V. Paxson, "BRO: A System for Detecting Network Intruders in Real Time, " in Proc. 7th USENIX Security Symp., 1998.
    • (1998) Proc. 7th USENIX Security Symp
    • Paxson, V.1
  • 29
    • 27544510809 scopus 로고    scopus 로고
    • Shield: Vulnerability-driven network filter for preventing known vulnerability exploits
    • H. Wang, C. Guo, D. Simon, and A. Zugenmaier, "Shield: Vulnerability-Driven Network Filter for Preventing Known Vulnerability Exploits, " in Proc. ACM SIGCOMM Conf., 2004
    • (2004) Proc. ACM SIGCOMM Conf
    • Wang, H.1    Guo, C.2    Simon, D.3    Zugenmaier, A.4
  • 30
    • 33646048960 scopus 로고    scopus 로고
    • Honeycomb-creating intrusion detection signatures using honeypots
    • Boston, MA
    • C. Kreibich and J. Crowcroft, "Honeycomb-Creating Intrusion Detection Signatures Using Honeypots, " in ACM Workshop Hot Topics in Networks, Boston, MA, 2003.
    • (2003) ACM Workshop Hot Topics in Networks
    • Kreibich, C.1    Crowcroft, J.2
  • 31
    • 30344438592 scopus 로고    scopus 로고
    • Anomalous payload-based network intrusion detection
    • K. Wang and S. Stolfo, "Anomalous payload-based network intrusion detection, " in Proc. RAID'2004, 2004.
    • (2004) Proc. RAID'2004
    • Wang, K.1    Stolfo, S.2
  • 32
    • 85084163246 scopus 로고    scopus 로고
    • Autograph: Toward automated distributed worm distribution
    • K. Kim and B. Karp, "Autograph: Toward Automated Distributed Worm Distribution, " in Proc. USENIX Security Symp., 2004.
    • (2004) Proc. USENIX Security Symp
    • Kim, K.1    Karp, B.2
  • 33
    • 27544498978 scopus 로고    scopus 로고
    • Polygraph: Automatically generating signatures for polymorphic worms
    • Oakland, CA
    • J. Newsome, B. Karp, and D. Song, "Polygraph: Automatically Generating Signatures for Polymorphic Worms, " in 2005 IEEE Symp. Security and Privacy, Oakland, CA, 2005.
    • (2005) 2005 IEEE Symp. Security and Privacy
    • Newsome, J.1    Karp, B.2    Song, D.3
  • 34
    • 33751064824 scopus 로고    scopus 로고
    • Hamsa: Fast signature generation for zero-day polymorphic worms with provable attack resistance
    • Oakland, CA
    • Z. Li, M. Sanghi, Y. Chen, M. Kao, and B. Chavez, "Hamsa: Fast Signature Generation for Zero-day Polymorphic Worms with Provable Attack Resistance, " in 2006 IEEE Symp. Security and Privacy, Oakland, CA, 2006.
    • (2006) 2006 IEEE Symp. Security and Privacy
    • Li, Z.1    Sanghi, M.2    Chen, Y.3    Kao, M.4    Chavez, B.5
  • 37
    • 30144435491 scopus 로고    scopus 로고
    • Peer-To-peer acceb control architecture using trusted computing technology
    • Stockholm, Sweden
    • R. Sandhu and Z. Xinwen, "Peer-To-Peer Acceb Control Architecture Using Trusted Computing Technology, " in Proc. SACMAT05, Stockholm, Sweden, 2005
    • (2005) Proc. SACMAT05
    • Sandhu, R.1    Xinwen, Z.2
  • 39
    • 33646386296 scopus 로고    scopus 로고
    • Modeling and analyzing interaction between worm and antiworm in network worm spread
    • Y. Feng, D. Haixin, L. Xing, "Modeling and analyzing interaction between worm and antiworm in network worm spread, " Science in China Series E, vol. 34, no. 8, pp 841-856, 2004
    • (2004) Science in China Series e , vol.34 , Issue.8 , pp. 841-856
    • Feng, Y.1    Haixin, D.2    Xing, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.