Sciweavers

DIMVA
2007
13 years 6 months ago
Distributed Evasive Scan Techniques and Countermeasures
Scan detection and suppression methods are an important means for preventing the disclosure of network information to attackers. However, despite the importance of limiting the inf...
Min Gyung Kang, Juan Caballero, Dawn Xiaodong Song
DIMVA
2007
13 years 6 months ago
Passive Monitoring of DNS Anomalies
We collected DNS responses at the University of Auckland Internet gateway in an SQL database, and analyzed them to detect unusual behaviour. Our DNS response data have included typ...
Bojan Zdrnja, Nevil Brownlee, Duane Wessels
DIMVA
2007
13 years 6 months ago
Characterizing Dark DNS Behavior
Security researchers and network operators increasingly rely on information gathered from honeypots and sensors deployed on darknets, or unused address space, for attack detection....
Jon Oberheide, Manish Karir, Zhuoqing Morley Mao
DIMVA
2007
13 years 6 months ago
A Study of Malcode-Bearing Documents
By exploiting the object-oriented dynamic composability of modern document applications and formats, malcode hidden in otherwise inconspicuous documents can reach third-party appli...
Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, ...
DIMVA
2007
13 years 6 months ago
On the Adaptive Real-Time Detection of Fast-Propagating Network Worms
Abstract. We present two light-weight worm detection algorithms that offer significant advantages over fixed-threshold methods. The first algorithm, RBS (ratebased sequential hy...
Jaeyeon Jung, Rodolfo A. Milito, Vern Paxson
DIMVA
2007
13 years 6 months ago
Measurement and Analysis of Autonomous Spreading Malware in a University Environment
Abstract. Autonomous spreading malware in the form of bots or worms is a constant threat in today’s Internet. In the form of botnets, networks of compromised machines that can be...
Jan Goebel, Thorsten Holz, Carsten Willems