Misleading worm signature generators using deliberate noise injection
暂无分享,去创建一个
Wenke Lee | Roberto Perdisci | David Dagon | Prahlad Fogla | Monirul I. Sharif | Wenke Lee | R. Perdisci | D. Dagon | Prahlad Fogla
[1] Somesh Jha,et al. Automatic generation and analysis of NIDS attacks , 2004, 20th Annual Computer Security Applications Conference.
[2] James Newsome,et al. Polygraph: automatically generating signatures for polymorphic worms , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[3] Jon Crowcroft,et al. Honeycomb , 2004, Comput. Commun. Rev..
[4] Giovanni Vigna,et al. Testing network-based intrusion detection signatures using mutant exploits , 2004, CCS '04.
[5] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[6] Yong Tang,et al. Defending against Internet worms: a signature-based approach , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[7] Vince Fuller,et al. Classless Inter-Domain Routing (CIDR): an Address Assignment and Aggregation Strategy , 1993, RFC.
[8] Angelos D. Keromytis,et al. Countering code-injection attacks with instruction-set randomization , 2003, CCS '03.
[9] Giovanni Vigna,et al. An experience developing an IDS stimulator for the black-box testing of network intrusion detection systems , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[10] Daniel C. DuVarney,et al. Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits , 2003, USENIX Security Symposium.
[11] Salvatore J. Stolfo,et al. Anomalous Payload-Based Network Intrusion Detection , 2004, RAID.
[12] George Varghese,et al. Automated Worm Fingerprinting , 2004, OSDI.
[13] Stefan Savage,et al. Inside the Slammer Worm , 2003, IEEE Secur. Priv..
[14] David Moore,et al. Code-Red: a case study on the spread and victims of an internet worm , 2002, IMW '02.
[15] Wenke Lee,et al. Advanced Polymorphic Worms: Evading IDS by Blending in with Normal Traffic , 2005 .
[16] Zhenkai Liang,et al. Automatic generation of buffer overflow attack signatures: an approach based on program behavior models , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[17] Mark Handley,et al. Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics , 2001, USENIX Security Symposium.
[18] B. Karp,et al. Autograph: Toward Automated, Distributed Worm Signature Detection , 2004, USENIX Security Symposium.
[19] Somesh Jha,et al. An architecture for generating semantics-aware signatures , 2005 .