A Study of Formalized Presentation of Worm based on time-based Behavioral sequences |
Lee Min-Soo
(Korea University)
Shon Tae-Shik (Samsung Electronics) Cho Sang-Hyun (Korea University) Kim Dong-Soo (National Security research institute) Seo Jung-Taek (National Security research institute) Sohn Ki-Wook (National Security research institute) Moon Jong-Sub (Korea University) |
1 | Whalley I, Arnold B, Chess D, Morar J, Segal A, Swimmer M, 'An Environment for Controlled Worm Replication and Analysis', Virus Bulletin Conference, 2000, pp 77-100 |
2 | Szor P, 'The Art of Computer virus Research and defense', Addison-Wesley, 2005 |
3 | Sysinternal, 'Sysinternal Utils', http://www.sys internals.com |
4 | symantec,,'Symantec Security Response', http:// securityresponse.symantec.com/avcenter/venc/data/w32.sqlexp.worm.html, Visited 2005 |
5 | Moore D, Paxson V, Savage S, Shannon C, Staniford S and Weaver N,'Inside the slammer worm', IEEE Security and Privacy, August 2003, pp 33-39 |
6 | snort,'Snort', http://www.snort.org Visited 2005 |
7 | Kienzle DM, Elder MC, 'Recent Worms: A Survey and Trends', in Proceeding of the 2003 ACM workshop on Rapid Malcode, Oct 2003. pp 1-10 |
8 | symantec,,'Symantec Security Response', http://securityresponse.symantec.com, Visited 2005 |
9 | Wangner A, Dubendorfer T, Plattner B, Hiestand R, 'Experiences with worm propagation simulations' ,Proceedings of the 2003 ACM workshop on Rapid malcode Oct 2003, pp 34-4 |
10 | symantec,,'Symantec Security Response', http://securityresponse.symantec.com/avcenter/venc/data/w32.sasser.b.worm.html, Visited 2005 |
11 | symantec,,'Symantec Security Response', http:// securityresponse.symantec.com/avcenter/venc/data/w32.blaster.worm.html, Visited 2005 |
12 | Weaver N, Paxson V, Staniford S and Cunningham R, 'A taxonomy of computer worms', in Proceeding of the 2003 ACM workshop on Rapid Malcode, Oct 2003. pp 11-18 |
13 | Nazario J, Anderson J, Wash R and Connelly C, 'The Future of Internet Worms' 2001 Blackhat Briefings, LasVegas, NV, July 2001. pp 4-7 |