Systems and Methods for Computer Worm Defense

作者: Ashar Aziz

DOI:

关键词:

摘要: A computer worm defense system comprises multiple containment systems tied together by a management system. Each is deployed on separate communication network and contains sensor blocking In various embodiments, the may be transported from production network, where not readily identifiable, to an alternate in identifiable. Computer identifiers generated of one can provided only same system, but also distributed other systems.

参考文章(492)
George Cristian Chicioreanu, Anil Francis Thomas, Adrian Mihail Marinescu, Malware Detection Using Code Analysis and Behavior Monitoring ,(2008)
Brad Karp, Hyang-Ah Kim, Autograph: toward automated, distributed worm signature detection usenix security symposium. pp. 19- 19 ,(2004)
Clint Gibler, Jonathan Crussell, Jeremy Erickson, Hao Chen, AndroidLeaks: automatically detecting potential privacy leaks in android applications on a large scale trust and trustworthy computing. pp. 291- 307 ,(2012) , 10.1007/978-3-642-30921-2_17
Stacey C. Lum, Peer based network access control ,(2007)
Martina Lindorfer, Clemens Kolbitsch, Paolo Milani Comparetti, Detecting Environment-Sensitive Malware Lecture Notes in Computer Science. pp. 338- 357 ,(2011) , 10.1007/978-3-642-23644-0_18