A survey of internet worm detection and containment

P Li, M Salour, X Su - IEEE Communications Surveys & …, 2008 - ieeexplore.ieee.org
Self-duplicating, self-propagating malicious codes known as computer worms spread
themselves without any human interaction and launch the most destructive attacks against …

Towards automatic generation of vulnerability-based signatures

D Brumley, J Newsome, D Song… - 2006 IEEE Symposium …, 2006 - ieeexplore.ieee.org
In this paper we explore the problem of creating vulnerability signatures. A vulnerability
signature matches all exploits of a given vulnerability, even polymorphic or metamorphic …

Improving sensor network immunity under worm attacks: a software diversity approach

Y Yang, S Zhu, G Cao - Proceedings of the 9th ACM international …, 2008 - dl.acm.org
Because of cost and resource constraints, sensor nodes do not have a complicated
hardware architecture or operating system to protect program safety. Hence, the notorious …

Sweeper: A lightweight end-to-end system for defending against fast worms

J Tucek, J Newsome, S Lu, C Huang… - Proceedings of the 2nd …, 2007 - dl.acm.org
The vulnerabilities that plague computers cause endless grief to users. Slammer
compromised millions of hosts in minutes; a hit-list worm would take under a second …

Topological properties of robust biological and computational networks

S Navlakha, X He, C Faloutsos… - Journal of the Royal …, 2014 - royalsocietypublishing.org
Network robustness is an important principle in biology and engineering. Previous studies of
global networks have identified both redundancy and sparseness as topological properties …

An information-theoretic view of network-aware malware attacks

Z Chen, C Ji - IEEE Transactions on Information Forensics and …, 2009 - ieeexplore.ieee.org
This work provides an information-theoretic view to better understand the relationships
between aggregated vulnerability information viewed by attackers and a class of …

[PDF][PDF] Survey of polymorphic worm signatures

S Paul, BK Mishra - International Journal of u-and e-Service …, 2014 - researchgate.net
Worms are self–replicating, fast moving malicious codes, capable of spreading themselves
without human interaction. It'sa weapon of choice for those, who like to launch destructive …

Theory and techniques for automatic generation of vulnerability-based signatures

D Brumley, J Newsome, D Song… - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
In this paper, we explore the problem of creating\emph {vulnerability signatures}. A
vulnerability signature is based on a program vulnerability, and is not specific to any …

Measuring network-aware worm spreading ability

Z Chen, C Ji - IEEE INFOCOM 2007-26th IEEE International …, 2007 - ieeexplore.ieee.org
This work investigates three aspects:(a) a network vulnerability as the non-uniform
vulnerable-host distribution,(b) threats, ie, intelligent worms that exploit such a vulnerability …

[图书][B] Anomaly detection for HTTP intrusion detection: algorithm comparisons and the effect of generalization on accuracy

KLR Ingham III - 2007 - search.proquest.com
Network servers are vulnerable to attack, and this state of affairs shows no sign of abating.
Therefore security measures to protect vulnerable software is an important part of keeping …