BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation
暂无分享,去创建一个
Vinod Yegneswaran | Guofei Gu | Phillip A. Porras | Martin W. Fong | V. Yegneswaran | Wenke Lee | G. Gu
[1] Evangelos Kranakis,et al. Exposure Maps: Removing Reliance on Attribution During Scan Detection , 2006, HotSec.
[2] Giovanni Vigna,et al. STATL: An Attack Language for State-Based Intrusion Detection , 2002, J. Comput. Secur..
[3] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[4] Daniel R. Ellis,et al. A behavioral approach to worm detection , 2004, WORM '04.
[5] Suresh Singh,et al. An Algorithm for Anomaly-based Botnet Detection , 2006, SRUTI.
[6] Sushil Jajodia,et al. CARDS: A Distributed System for Detecting Coordinated Attacks , 2000, SEC.
[7] Dawn Song,et al. Malware Detection (Advances in Information Security) , 2006 .
[8] Felix C. Freiling,et al. Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks , 2005, ESORICS.
[9] Vinod Yegneswaran,et al. Using Honeynets for Internet Situational Awareness , 2005 .
[10] Brian Rexroad,et al. Wide-Scale Botnet Detection and Characterization , 2007, HotBots.
[11] Salvatore J. Stolfo,et al. Anagram: A Content Anomaly Detector Resistant to Mimicry Attack , 2006, RAID.
[12] Stefan Savage,et al. Inferring Internet denial-of-service activity , 2001, TOCS.
[13] Angelos D. Keromytis,et al. Detecting Targeted Attacks Using Shadow Honeypots , 2005, USENIX Security Symposium.
[14] Nick Feamster,et al. Understanding the network-level behavior of spammers , 2006, SIGCOMM.
[15] Salvatore J. Stolfo,et al. Anomalous Payload-Based Worm Detection and Signature Generation , 2005, RAID.
[16] Steven J. Templeton,et al. A requires/provides model for computer attacks , 2001, NSPW '00.
[17] Giovanni Vigna,et al. NetSTAT: a network-based intrusion detection approach , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[18] Xuxian Jiang,et al. Profiling self-propagating worms via behavioral footprinting , 2006, WORM '06.
[19] Hari Balakrishnan,et al. Fast portscan detection using sequential hypothesis testing , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[20] Richard A. Kemmerer,et al. State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..
[21] Ulf Lindqvist,et al. Modeling multistep cyber attacks for scenario recognition , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[22] Phillip A. Porras. Privacy-Enabled Global Threat Monitoring , 2006, IEEE Security & Privacy.
[23] W. Timothy Strayer,et al. Using Machine Learning Techniques to Identify Botnet Traffic , 2006 .
[24] Stuart Staniford-Chen,et al. Practical Automated Detection of Stealthy Portscans , 2002, J. Comput. Secur..
[25] Vern Paxson,et al. Enhancing byte-level network intrusion detection signatures with context , 2003, CCS '03.
[26] Alfonso Valdes,et al. Probabilistic Alert Correlation , 2001, Recent Advances in Intrusion Detection.
[27] Wenke Lee,et al. Modeling Botnet Propagation Using Time Zones , 2006, NDSS.
[28] Lada A. Adamic,et al. Zipf's law and the Internet , 2002, Glottometrics.
[29] Farnam Jahanian,et al. The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets , 2005, SRUTI.
[30] Cristina L. Abad,et al. Log correlation for intrusion detection: a proof of concept , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[31] Christopher Krügel,et al. Comprehensive approach to intrusion detection alert correlation , 2004, IEEE Transactions on Dependable and Secure Computing.
[32] Karl N. Levitt,et al. GrIDS A Graph-Based Intrusion Detection System for Large Networks , 1996 .
[33] Frédéric Cuppens,et al. Alert correlation in a cooperative intrusion detection framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[34] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[35] Salvatore J. Stolfo,et al. Anomalous Payload-Based Network Intrusion Detection , 2004, RAID.
[36] Guofei Gu,et al. Using an Ensemble of One-Class SVM Classifiers to Harden Payload-based Anomaly Detection Systems , 2006, Sixth International Conference on Data Mining (ICDM'06).
[37] Andreas Terzis,et al. A multifaceted approach to understanding the botnet phenomenon , 2006, IMC '06.
[38] Wenke Lee,et al. Polymorphic Blending Attacks , 2006, USENIX Security Symposium.
[39] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[40] Vinod Yegneswaran,et al. An Inside Look at Botnets , 2007, Malware Detection.
[41] Peng Ning,et al. Constructing attack scenarios through correlation of intrusion alerts , 2002, CCS '02.
[42] Thorsten Holz,et al. Rishi: Identify Bot Contaminated Hosts by IRC Nickname Evaluation , 2007, HotBots.
[43] Felix C. Freiling,et al. The Nepenthes Platform: An Efficient Approach to Collect Malware , 2006, RAID.