[1] |
FOGLAP , SHARIFM , PERDISCIR , et al. Polymorphic blending attacks[A]. Proceedings of the 15th Conference on USENIX Security Symposium[C]. Berkeley, CA, USA, 2006,17.
|
[2] |
GUNDYM V , BALZAROTTID , FIELDSCHEMAG V . Catch me, if you can: evading network signatures with Web-based polymorphic worms[A]. Proceedings of the First USENIX Workshop on Offensive Technologies (WOOT)[C]. Boston, MA,USA, 2007.
|
[3] |
唐勇, 卢锡城, 王勇军 . 攻击特征自动提取技术综述[J]. 通信学报, 2009,30(2): 96-105. TANGY , LUX C , WANGY J . Survey of automatic attack s gnature generation[J]. Journal on Communications, 2009,30(2): 96-105.
|
[4] |
KREIBICHC , CROWCROFTJ . Honeycomb-creating intrusion detection signatures using honeypots[A]. Proceedings of the Second Workshop on Hot Topics in Networks (Hotnets II)[C]. Boston, 2003. 51-56.
|
[5] |
WANGK , CRETUG , STOLFOS J . Anomalous payload-based worm detection and signature generation[A]. Proceedings of Recent Ad-vances in Intrusion Detection (RAID)[C]. 2003. 227-246.
|
[6] |
SINGHS , ESTANC , VARGHESEG , et al. Automated worm finger-printing[A]. Proceedings of the 6th USENIX OSDI[C]. 2004. 45-60.
|
[7] |
KIMH A , KARPB . Autograph: toward automated, distribu worm signature detection[A]. Proceedings of USENIX Security Sympo-sium[C]. 2004. 271-286.
|
[8] |
SINGHS , ESTANC , VARGHESEG , et al. Automated worm finger-printing[A]. Proceedings of the 6th USENIX OSDI[C]. San Francisco, CA, 2004. 45-60.
|
[9] |
NEWSOMEJ , KARPB , SONGD . Polygraph: automatically generat-ing signatures for polymorphic worms[A]. Proceedings of IEEE Sym-posium on Security and Privacy[C]. Washington, DC, USA, 2005. 226-241.
|
[10] |
LIZ , SANGHIM , CHENY , et al. Hamsa: fast signature generation for zero-day polymorphic worms with provable attack resilience[A]. Proceedings of IEEE Symposium on Security and Privacy[C]. Wash-ington, DC, USA, 2006. 32-47.
|
[11] |
YEGNESWARANV , GIFFINJ T , BARFORDP , et al. An architec-ture for generating semantics-aware signatures[A]. Proceedings of the 14th USENIX Security Symposium[C]. Baltimore, MD, USA, 2005. 97-112.
|
[12] |
唐勇, 卢锡城, 胡华平 等. 基于多序列联配的攻击特征自动提取技术研究[J]. 计算机学报, 2006,29(9): 1533-1541. TANGY , LUX C , HUH P , et al. Automatic generation of attack sig-natures based on multi-sequence alignment[J]. Chinese Journal of computers, 2006,29(9): 1533-1541.
|
[13] |
TANGY , LUX , XIAOB . Generating simplified regular expression Signatures for polymorphic worms[A]. Proceedings of the 4th Interna-tional Conference on Autonomic and Trusted Computing (ATC-07)[C]. 2007. 478-488.
|
[14] |
TANGY , LUX , XIAOB . Using a bioinformatics approach to gener-ate accurate exploit-based signatures for polymorphic worms[J]. Comput, Secur, 2009.
|
[15] |
诸葛建伟, 韩心慧, 周勇林 等. HoneyBow:一个基于高交互式蜜罐技术的恶意代码自动捕获器[J]. 通信学报, 2007,28(12): 8-13. ZHUGEJ W , HANX H , ZHOUY L , et al. HoneyBow:an automated malware collection tool based on the high-interaction honeypot prin-ciple[J]. Journal on Communications, 2007,28(12): 8-13.
|
[16] |
LIPPMANNR , HAINESJ W , FRIEDD J , et al. The 1999 DARPA off-line intrusion detection evaluation[J]. Comput, Networks, 2000,34(4): 579-595.
|