Worm Infection Locality Supports for Efficient Traceback Forensics
暂无分享,去创建一个
Guo-Tan Liao | Bo-Chao Cheng | Huan Chen | Wei-Jie Liau | Huan Chen | Bo-Chao Cheng | Guo-Tan Liao | Wei-Jie Liau
[1] Bo-Chao Cheng,et al. Developing and Implementing IHPM on IXP 425 Network Processor Platforms , 2005, WISA.
[2] Karen A. Scarfone,et al. Guide to Computer and Network Data Analysis: Applying Forensic Techniques to Incident Response , 2005 .
[3] David A. Maltz,et al. Toward a Framework for Internet Forensic Analysis , 2004 .
[5] Anna R. Karlin,et al. Network support for IP traceback , 2001, TNET.
[6] Steven M. Bellovin,et al. ICMP Traceback Messages , 2003 .
[7] Daniel R. Ellis,et al. A behavioral approach to worm detection , 2004, WORM '04.
[8] CSC 774 Network Security Spring 2003 A Little Background On Trace Back , 2022 .
[9] David A. Maltz,et al. Worm origin identification using random moonwalks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[10] Dennis J. Turner,et al. Symantec Internet Security Threat Report Trends for July 04-December 04 , 2005 .