Sun et al., 2009 - Google Patents
A rough set approach for automatic key attributes identification of zero-day polymorphic wormsSun et al., 2009
- Document ID
 - 14445506820595397044
 - Author
 - Sun W
 - Chen Y
 - Publication year
 - Publication venue
 - Expert Systems with Applications
 
External Links
Snippet
In recent years, given their rapid propagations, Internet worms increasingly threaten the  Internet hosts and services. It's worsen by the fact that zero-day polymorphic worms, which  can change their patterns dynamically, would evade most existing intrusion detection … 
    - 238000001514 detection method 0 abstract description 26
 
Classifications
- 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L63/00—Network architectures or network communication protocols for network security
 - H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
 - H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
 - H04L63/1425—Traffic logging, e.g. anomaly detection
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L63/00—Network architectures or network communication protocols for network security
 - H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
 - H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
 - H04L63/1416—Event detection, e.g. attack signature detection
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L63/00—Network architectures or network communication protocols for network security
 - H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
 - H04L63/1441—Countermeasures against malicious traffic
 - H04L63/1458—Denial of Service
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L63/00—Network architectures or network communication protocols for network security
 - H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
 - H04L63/1441—Countermeasures against malicious traffic
 - H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
 - G06F21/55—Detecting local intrusion or implementing counter-measures
 - G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
 - G06F21/562—Static detection
 - G06F21/563—Static detection by source code analysis
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L63/00—Network architectures or network communication protocols for network security
 - H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
 - H04L63/1433—Vulnerability analysis
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L63/00—Network architectures or network communication protocols for network security
 - H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
 - H04L63/1441—Countermeasures against malicious traffic
 - H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L63/00—Network architectures or network communication protocols for network security
 - H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
 - H04L63/1441—Countermeasures against malicious traffic
 - H04L63/1491—Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L63/00—Network architectures or network communication protocols for network security
 - H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
 - H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
 - H04L63/0218—Distributed architectures, e.g. distributed firewalls
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
 - G06F21/55—Detecting local intrusion or implementing counter-measures
 - G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L63/00—Network architectures or network communication protocols for network security
 - H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
 - H04L63/0227—Filtering policies
 - H04L63/0263—Rule management
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
 - G06F21/55—Detecting local intrusion or implementing counter-measures
 - G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
 - G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
 - G06F21/577—Assessing vulnerabilities and evaluating computer system security
 
 
Similar Documents
| Publication | Publication Date | Title | 
|---|---|---|
| Kirubavathi et al. | Botnet detection via mining of traffic flow characteristics | |
| EP1995929B1 (en) | Distributed system for the detection of eThreats | |
| Norouzian et al. | Classifying attacks in a network intrusion detection system based on artificial neural networks | |
| Moustaf et al. | Creating novel features to anomaly network detection using DARPA-2009 data set | |
| Shrivastava et al. | Effective anomaly based intrusion detection using rough set theory and support vector machine | |
| Dhakar et al. | A novel data mining based hybrid intrusion detection framework | |
| Shin et al. | Unsupervised multi-stage attack detection framework without details on single-stage attacks | |
| Sharma et al. | An overview of flow-based anomaly detection | |
| Le et al. | Unsupervised monitoring of network and service behaviour using self organizing maps | |
| Almomani et al. | Reconnaissance attack detection via boosting machine learning classifiers | |
| Zaheer et al. | A hybrid model for botnet detection using machine learning | |
| Ramesh et al. | Analyzing and detecting botnet attacks using anomaly detection with machine learning | |
| Shamsolmoali et al. | C2DF: High rate DDOS filtering method in cloud computing | |
| Sun et al. | A rough set approach for automatic key attributes identification of zero-day polymorphic worms | |
| Catak | Two-layer malicious network flow detection system with sparse linear model based feature selection | |
| Meng et al. | Adaptive character frequency-based exclusive signature matching scheme in distributed intrusion detection environment | |
| Sammany et al. | Artificial neural networks architecture for intrusion detection systems and classification of attacks | |
| Yin et al. | Optimal remote access Trojans detection based on network behavior | |
| Yong et al. | Understanding botnet: From mathematical modelling to integrated detection and mitigation framework | |
| Makiou et al. | Hybrid approach to detect SQLi attacks and evasion techniques | |
| Shinde et al. | Early dos attack detection using smoothened time-series andwavelet analysis | |
| Zargar et al. | Identification of effective network features to detect Smurf attacks | |
| Dayanandam et al. | Regression algorithms for efficient detection and prediction of DDoS attacks | |
| Logeswari et al. | Designing a SDN-Based Intrusion Detection and Mitigation System Using Machine Learning Techniques | |
| Patil et al. | Network intrusion detection and prevention techniques for DoS attacks |