參考文獻 |
[1]P. Baeched et al., "The Nepenthes Platform: An Efficient Approach to Collect Malware", The 9th International Symposium on Recent Advances in Intrusion Detection (RAID), Sept. 2006
[2]Yong Tang and Shigang Chen, “Defending Against Internet Worms: A Signature-Based Approach “, IEEE INFOCOM, Miami, FL, March, 2005.
[3]Michele Garetto, Weibo Gong, and Don Towsley, “Modeling Malware Spreading Dynamics“, IEEE INFOCOM, San Francisco, CA, USA, April, 2003.
[4] Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis “On the Effectiveness of Distributed Worm Monitoring “, USENIX Security Symposium, 2005
[5] Zhenkai Liang, R. Sekar, “Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models “Annual Computer Security Applications Conference (ACSAC 2005)
[6]Gaurav Kataria,Gaurav Anand, Rudolph Araujo, Ramayya Krishnan,Adrian Perrig "A Distributed Stealthy Coordination Mechanism for Worm Synchronization", IEEE Securecomm & Workshop, 2006.
[7]Zhenkai Liang, R. Sekar" Fast and automated generation of attack signatures: a basis for building self-protecting servers", Conference on Computer and Communications Security, Proceedings of the 12th ACM conference on Computer and communications security
[8]Randy Smith, Cristian Estan, Somesh Jha" Backtracking Algorithmic Complexity Attacks Against a NIDS ", Annual Computer Security Applications Conference (ACSAC 2006)
[9] “2003 CSI/FBI Computer Crime and Security Survey. Security”,
http:// www.reddshell.com/docs/csi_fbi_2003.pdf
[10]“Linux Networking Kernel”,
http://www.ecsl.cs.sunysb.edu/elibrary/linux/network/LinuxKernel.pdf
[11] H. Shacham, M. Page, B. Pfaff, Eu-Jin Goh, N. Modadugu, and Dan Boneh, “On the Effectiveness of Address-Space Randomization ” , Proceedings of the 11th ACM conference on Computer and communications security, 2004
[12]T. Bu, A. Chen, S. V. Wiel, and T. Woo “Design And Evaluation of A Fast And Robust Worm Detection Algorithm”, INFOCOM 2006. In the Proceedings of 25th IEEE International Conference on Computer Communications.
[13]D. Moore, C. Shannon, G. M. Voelker, and S. Savage “Internet Quarantine: Requirements for Containing Self-Propagating Code” , infocom 2003
[14]Fu-Hau Hsu, Fanglu Guo, and Tzi-cker Chiueh, “Scalable Network-based Buffer Overflow Attack Detection”, in Proceedings of ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS 2006), San Jose, California, USA, December, 2006.
[15]S. Staniford, V. Paxson and N. Weaver “The Top Speed of Flash Worms”, In the proceedings of the ACM Workshop on Rapid Malcode (WORM ), Fairfax, VA, Oct. 2004
[16] J. Xu, P. Ning, C. Kil, Y. Zhai, C. Bookholt, "Automatic diagnosis and response to memory corruption vulnerabilities", ACM Conference on Computer Communications Security (CCS 2005)
[17]J. Ma, G. M. Voelker, and Stefan Savage “Self-Stopping Worms”, In the proceedings of the ACM Workshop on Rapid Malcode (WORM ), Fairfax, VA, Oct. 2005
[18]Zheng, H., & Duan, H. “Active Technologies to Contain Internet Worm.”, Worm blog. Retrieved April 1, 2007, from http://wiki.ccert.edu.cn/doc/spark/
ActiveTechnologiestoContainInternetWorm.pdf
[19] N. Weaver, V. Paxson, S. Staniford, and R. Cunningham, “A Taxonomy of Computer Worms”, Proceedings of the 2003 ACM workshop on Rapid Malcode, 2003
[20] S. Staniford, V. Paxson and N. Weaver “How To Own The Internet In Your Spare Time”, In the Proceedings of USENIX Security Symposium, San Francisco, CA, Aug. 2002
[21] PAX Project http://pax.grsecurity.net/
[22] Paul Bächer, Thorsten Holz, Markus Kötter, Georg Wicherski, “Know your Enemy:Tracking Botnets”, http://www.honeynet.org/papers/bots/
[23] “Smashing The Stack For Fun And Profit”, http://www.cs.wright.edu/~tkprasad/courses/cs781/alephOne.html
[24] Wiki, “Buffer overflow”http://en.wikipedia.org/wiki/Buffer_overflow
[25] Gaurav S. Kc, Angelos D. Keromytis, Vassilis Prevelakis, ”Countering code-injection attacks with instruction-set randomization”, Conference on Computer and Communications Security, Proceedings of the 10th ACM conference on Computer and communications security
[26]CAIDA, http://www.caida.org/home/
[27]DShield, http://www.dshield.org/
[28]Eugene H. Spafford,” The internet worm: the Crisis and aftermath”, CACM, June 1989, vol32, number 6
[29] Milw0rm, http://www.milw0rm.com/shellcode/linux/x86
[30] Izik, “Advanced Buffer Overflow Methods”,
http://events.ccc.de/congress/2005/fahrplan/attachments/539-Paper_AdvancedBufferOverflowMethods.pdf |