Workaround for Welchia and Sasser Internet Worms in Kumamoto University

作者: Yasuo Musashi , Kenichi Sugitani , Ryuichi Matsuba

DOI:

关键词:

摘要:

参考文章(6)
Haiguang Lai, Shengwen Cai, Hao Huang, Junyuan Xie, Hui Li, A Parallel Intrusion Detection System for High-Speed Networks applied cryptography and network security. pp. 439- 451 ,(2004) , 10.1007/978-3-540-24852-1_32
Steven A. Hofmeyr, Stephanie Forrest, Anil Somayaji, Intrusion detection using sequences of system calls Journal of Computer Security. ,vol. 6, pp. 151- 180 ,(1998) , 10.3233/JCS-980109
Wu Yang, Bin-Xing Fang, Bo Liu, Hong-Li Zhang, Intrusion detection system for high-speed network Computer Communications. ,vol. 27, pp. 1288- 1294 ,(2004) , 10.1016/J.COMCOM.2004.03.001
C. Warrender, S. Forrest, B. Pearlmutter, Detecting intrusions using system calls: alternative data models ieee symposium on security and privacy. pp. 133- 145 ,(1999) , 10.1109/SECPRI.1999.766910
D.E. Denning, An Intrusion-Detection Model IEEE Transactions on Software Engineering. ,vol. 13, pp. 222- 232 ,(1987) , 10.1109/TSE.1987.232894
Biswanath Mukherjee, L Todd Heberlein, Karl N Levitt, None, Network intrusion detection IEEE Network. ,vol. 8, pp. 26- 41 ,(1994) , 10.1109/65.283931