Sciweavers

DIMVA
2004
13 years 5 months ago
Foundations for Intrusion Prevention
: We propose an infrastructure that helps a system administrator to identify a newly published vulnerability on the site hosts and to evaluate the vulnerability's threat with ...
Shai Rubin, Ian D. Alderman, David W. Parter, Mary...
DIMVA
2004
13 years 5 months ago
A Honeynet within the German Research Network - Experiences and Results
: A honeynet is a special prepared network which is not used in normal business. It is a kind of playground to watch and learn the tactics of crackers. The only purpose of a honeyn...
Helmut Reiser, Gereon Volker
DIMVA
2004
13 years 5 months ago
LIV - The Linux Integrated Viruswall
This paper presents a system developed in Linux aiming the protection of local area networks containing Windows workstations against malicious agents. The developed solution, named...
Teobaldo A. Dantas de Medeiros, Paulo S. Motta Pir...
DIMVA
2004
13 years 5 months ago
Sensors for Detection of Misbehaving Nodes in MANETs
: The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node may exhibi...
Frank Kargl, Andreas Klenk, Michael Weber, Stefan ...
DIMVA
2004
13 years 5 months ago
Structural Comparison of Executable Objects
: A method to heuristically construct an isomorphism between the sets of functions in two similar but differing versions of the same executable file is presented. Such an isomorphi...
Halvar Flake
DIMVA
2004
13 years 5 months ago
Risiken der Nichterkennung von Malware in komprimierter Form
: Malizi
Heiko Fangmeier, Michel Messerschmidt, Fabian M&uu...
DIMVA
2004
13 years 5 months ago
Alarm Reduction and Correlation in Intrusion Detection Systems
: Large Critical Complex Infrastructures are increasingly dependent on IP networks. Reliability by redundancy and tolerance are an imperative for such dependable networks. In order...
Tobias Chyssler, Stefan Burschka, Michael Semling,...
DIMVA
2007
13 years 5 months ago
Protecting the Intranet Against "JavaScript Malware" and Related Attacks
The networking functionality of JavaScript is restricted by the Same Origin Policy (SOP). However, as the SOP applies on a document level, JavaScript still possesses certain functi...
Martin Johns, Justus Winter
DIMVA
2007
13 years 5 months ago
Characterizing Bots' Remote Control Behavior
A botnet is a collection of bots, each generally running on a compromised system and responding to commands over a “commandand-control” overlay network. We investigate observab...
Elizabeth Stinson, John C. Mitchell