메뉴 건너뛰기




Volumn , Issue , 2009, Pages 351-366

Effective and efficient malware detection at the end host

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SYSTEM FIREWALLS; DENIAL-OF-SERVICE ATTACK; NETWORK SECURITY;

EID: 85076206522     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (419)

References (56)
  • 1
    • 85080519930 scopus 로고    scopus 로고
    • ANUBIS. http://anubis.iseclab.org, 2009.
    • (2009)
  • 9
    • 84924223669 scopus 로고    scopus 로고
    • Static analysis of executables to detect malicious patterns
    • CHRISTODORESCU, M., AND JHA, S. Static Analysis of Executables to Detect Malicious Patterns. In Usenix Security Symposium (2003).
    • (2003) Usenix Security Symposium
    • Christodorescu, M.1    Jha, S.2
  • 19
    • 85075837457 scopus 로고    scopus 로고
    • Bot-Miner: Clustering analysis of network traffic for protocol- And structure-independent botnet detection
    • GU, G., PERDISCI, R., ZHANG, J., AND LEE, W. Bot-Miner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection. In 17th Usenix Security Symposium (2008).
    • (2008) 17th Usenix Security Symposium
    • Gu, G.1    Perdisci, R.2    Zhang, J.3    Lee, W.4
  • 33
    • 0033295259 scopus 로고    scopus 로고
    • BrO: A system for detecting network intruders in real-time
    • PAXSON, V. Bro: A System for Detecting Network Intruders in Real-Time. Computer Networks 31 (1999).
    • (1999) Computer Networks , vol.31
    • Paxson, V.1
  • 54
    • 34047110218 scopus 로고    scopus 로고
    • Toward automated dynamic malware analysis using CWsandbox
    • WILLEMS, C., HOLZ, T., AND FREILING, F. Toward Automated Dynamic Malware Analysis Using CWSandbox. IEEE Security and Privacy 2, 2007 (5).
    • (2007) IEEE Security and Privacy , vol.2 , Issue.5
    • Willems, C.1    Holz, T.2    Freiling, F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.