Nothing Special   »   [go: up one dir, main page]

Chen et al., 2005 - Google Patents

Detecting Internet worms at early stage

Chen et al., 2005

View PDF
Document ID
14566541272733623475
Author
Chen S
Ranka S
Publication year
Publication venue
IEEE Journal on Selected Areas in Communications

External Links

Snippet

Managing the security of enterprise networks has emerged to be a critical problem in the era of Internet economy. Arising as a leading threat, worms repetitively caused enormous damage to the Internet community during the past years. A new security service that …
Continue reading at www.cise.ufl.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Similar Documents

Publication Publication Date Title
Li et al. A survey of internet worm detection and containment
Whyte et al. DNS-based Detection of Scanning Worms in an Enterprise Network.
Wang et al. Honeypot detection in advanced botnet attacks
Abu Rajab et al. A multifaceted approach to understanding the botnet phenomenon
Ndatinya et al. Network forensics analysis using Wireshark
Bakos et al. Early detection of internet worm activity by metering icmp destination unreachable messages
Safar et al. Characterising and detection of botnet in P2P network for UDP protocol
Chen et al. Detecting Internet worms at early stage
Chen et al. DAW: A distributed antiworm system
Ghorbani et al. Network attacks
Al-Duwairi et al. Distributed packet pairing for reflector based DDoS attack mitigation
Chen et al. An Internet-worm early warning system
Zhong et al. Research on DDoS Attacks in IPv6
Borders et al. OpenFire: Using deception to reduce network attacks
Fabian et al. A multifaceted approach to understanding the botnet phenomenon
Shing An improved tarpit for network deception
Mitrokotsa et al. Denial-of-service attacks
Singh et al. Communication based vulnerabilities and script based solvabilities
Salimova A virtual honeypot framework
Sallowm et al. a hybrid honeypot scheme for Distributed Denial of Service Attack
Wang et al. A dynamic analysis security testing infrastructure for internet of things
Nagaonkar et al. Detecting stealthy scans and scanning patterns using threshold random walk
Regenold et al. Enhancing enterprise security through cost-effective and highly customizable network monitoring
Heikura Analyzing Offensive and Defensive Networking Tools in a Laboratory Environme
Moore et al. Quantitative network security analysis