A framework for automated malcode signatures generation
H Rajabi, MN Marsono… - 2010 IEEE Student …, 2010 - ieeexplore.ieee.org
… rapid malcode attacks accurately with low false positive rate as well as the quick detection
rapid malcode … sifts traffic payload to identify new rapid malcodes signatures based on their …
rapid malcode … sifts traffic payload to identify new rapid malcodes signatures based on their …
Recent worms: a survey and trends
DM Kienzle, MC Elder - … of the 2003 ACM workshop on Rapid Malcode, 2003 - dl.acm.org
In this paper, we present a broad overview of recent worm activity. Virus information repositories,
such as the Network Associates' Virus Information Library, contain over 4500 different …
such as the Network Associates' Virus Information Library, contain over 4500 different …
A taxonomy of computer worms
To understand the threat posed by computer worms, it is necessary to understand the classes
of worms, the attackers who may employ them, and the potential payloads. This paper …
of worms, the attackers who may employ them, and the potential payloads. This paper …
Defending against hitlist worms using network address space randomization
Worms are self-replicating malicious programs that represent a major security threat for the
Internet, as they can infect and damage a large number of vulnerable hosts at timescales …
Internet, as they can infect and damage a large number of vulnerable hosts at timescales …
Epidemic profiles and defense of scale-free networks
L Briesemeister, P Lincoln, P Porras - … ACM workshop on Rapid malcode, 2003 - dl.acm.org
In this paper, we study the defensibility of large scale-free networks against malicious rapidly
self-propagating code such as worms and viruses. We develop a framework to investigate …
self-propagating code such as worms and viruses. We develop a framework to investigate …
Review and analysis of synthetic diversity for breaking monocultures
JE Just, M Cornwell - … of the 2004 ACM workshop on Rapid malcode, 2004 - dl.acm.org
Proceedings of the 2004 ACM workshop on Rapid malcode: Review and analysis of … In
6th Workshop on Hot Topics in Operating Systems, pages 67-72, Los Alamitos, CA, 1997. …
6th Workshop on Hot Topics in Operating Systems, pages 67-72, Los Alamitos, CA, 1997. …
The top speed of flash worms
Proceedings of the 2004 ACM workshop on Rapid malcode: The top speed of flash worms …
They observed that Instant Messenger (IM) networks can support very rapid topological [23] …
They observed that Instant Messenger (IM) networks can support very rapid topological [23] …
Worm vs. worm: preliminary study of an active counter-attack mechanism
F Castaneda, EC Sezer, J Xu - … 2004 ACM workshop on Rapid malcode, 2004 - dl.acm.org
Proceedings of the 2004 ACM workshop on Rapid malcode: WORM vs. WORM: preliminary …
Because of this the CodeRed worm message may contain the entire worm malcode and …
Because of this the CodeRed worm message may contain the entire worm malcode and …
A behavioral approach to worm detection
DR Ellis, JG Aiken, KS Attwood… - … ACM workshop on Rapid …, 2004 - dl.acm.org
This paper presents a new approach to the automatic detection of worms using behavioral
signatures. A behavioral signature describes aspects of any particular worm's behavior that …
signatures. A behavioral signature describes aspects of any particular worm's behavior that …
Worm propagation modeling and analysis under dynamic quarantine defense
Due to the fast spreading nature and great damage of Internet worms, it is necessary to
implement automatic mitigation, such as dynamic quarantine, on computer networks. …
implement automatic mitigation, such as dynamic quarantine, on computer networks. …