메뉴 건너뛰기




Volumn , Issue , 2006, Pages 241-256

Polymorphic blending attacks

Author keywords

[No Author keywords available]

Indexed keywords

BLENDING; COMPUTER CRIME; INTRUSION DETECTION;

EID: 85077703150     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (192)

References (37)
  • 10
    • 70249138620 scopus 로고    scopus 로고
    • Threat Intelligence Group. Phatbot trojan analysis. http://www.lurhq.com/phatbot.html.
    • Phatbot Trojan Analysis
  • 11
    • 85084160972 scopus 로고    scopus 로고
    • Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
    • M. Handley and V. Paxson. Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics. In 10th USENIX Security Symposium, 2001.
    • (2001) 10th USENIX Security Symposium
    • Handley, M.1    Paxson, V.2
  • 15
    • 0036038437 scopus 로고    scopus 로고
    • Service specific anomaly detection for network intrusion detection
    • C. Kruegel, T. Toth, and E. Kirda. Service specific anomaly detection for network intrusion detection. In Proceedings of ACM SIGSAC, 2002.
    • (2002) Proceedings of ACM SIGSAC
    • Kruegel, C.1    Toth, T.2    Kirda, E.3
  • 16
    • 14844319067 scopus 로고    scopus 로고
    • Anomaly detection of web-based attacks
    • C. Kruegel and G. Vigna. Anomaly detection of web-based attacks. In Proceedings of ACM CCS, pages 251–261, 2003.
    • (2003) Proceedings of ACM CCS , pp. 251-261
    • Kruegel, C.1    Vigna, G.2
  • 18
    • 0037661195 scopus 로고    scopus 로고
    • Network traffic anomaly detection based on packet bytes
    • M. Mahoney. Network traffic anomaly detection based on packet bytes. In Proceedings of ACM SIGSAC, 2003.
    • (2003) Proceedings of ACM SIGSAC
    • Mahoney, M.1
  • 19
    • 0242456801 scopus 로고    scopus 로고
    • Learning nonstationary models of normal network traffic for detecting novel attacks
    • M. Mahoney and P.K. Chan. Learning nonstationary models of normal network traffic for detecting novel attacks. In Proceedings of SIGKDD, 2002.
    • (2002) Proceedings of SIGKDD
    • Mahoney, M.1    Chan, P.K.2
  • 28
    • 34547257114 scopus 로고    scopus 로고
    • Advanced code evolution techniques and computer virus generator kits
    • P. Szor. Advanced code evolution techniques and computer virus generator kits. The Art of Computer Virus Research and Defense, 2005.
    • (2005) The Art of Computer Virus Research and Defense
    • Szor, P.1
  • 34
    • 27544510809 scopus 로고    scopus 로고
    • Shield: Vulnerability-driven network filters for preventing known vulnerability exploits
    • H. J. Wang, C. Guo, D. R. Simon, and A. Zugenmaier. Shield: Vulnerability-driven network filters for preventing known vulnerability exploits. In the Proceedings of ACM SIGCOMM, 2004.
    • (2004) The Proceedings of ACM SIGCOMM
    • Wang, H.J.1    Guo, C.2    Simon, D.R.3    Zugenmaier, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.