Chen et al., 2005 - Google Patents
Detecting Internet worms at early stageChen et al., 2005
View PDF- Document ID
- 14566541272733623475
- Author
- Chen S
- Ranka S
- Publication year
- Publication venue
- IEEE Journal on Selected Areas in Communications
External Links
Snippet
Managing the security of enterprise networks has emerged to be a critical problem in the era of Internet economy. Arising as a leading threat, worms repetitively caused enormous damage to the Internet community during the past years. A new security service that …
- 230000000694 effects 0 abstract description 18
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Li et al. | A survey of internet worm detection and containment | |
Whyte et al. | DNS-based Detection of Scanning Worms in an Enterprise Network. | |
Wang et al. | Honeypot detection in advanced botnet attacks | |
Abu Rajab et al. | A multifaceted approach to understanding the botnet phenomenon | |
Ndatinya et al. | Network forensics analysis using Wireshark | |
Bakos et al. | Early detection of internet worm activity by metering icmp destination unreachable messages | |
Safar et al. | Characterising and detection of botnet in P2P network for UDP protocol | |
Chen et al. | Detecting Internet worms at early stage | |
Chen et al. | DAW: A distributed antiworm system | |
Ghorbani et al. | Network attacks | |
Al-Duwairi et al. | Distributed packet pairing for reflector based DDoS attack mitigation | |
Chen et al. | An Internet-worm early warning system | |
Zhong et al. | Research on DDoS Attacks in IPv6 | |
Borders et al. | OpenFire: Using deception to reduce network attacks | |
Fabian et al. | A multifaceted approach to understanding the botnet phenomenon | |
Shing | An improved tarpit for network deception | |
Mitrokotsa et al. | Denial-of-service attacks | |
Singh et al. | Communication based vulnerabilities and script based solvabilities | |
Salimova | A virtual honeypot framework | |
Sallowm et al. | a hybrid honeypot scheme for Distributed Denial of Service Attack | |
Wang et al. | A dynamic analysis security testing infrastructure for internet of things | |
Nagaonkar et al. | Detecting stealthy scans and scanning patterns using threshold random walk | |
Regenold et al. | Enhancing enterprise security through cost-effective and highly customizable network monitoring | |
Heikura | Analyzing Offensive and Defensive Networking Tools in a Laboratory Environme | |
Moore et al. | Quantitative network security analysis |