Boundary detection and containment of local worm infections
Diego Zamboni, James Riordan, et al.
SRUTI 2007
This paper proposes a novel framework to automatically discover and analyze traffc generated by computer worms and other anomalous behaviors that interact with a non-solicited traffc monitoring system. Network packets are analyzed by an Intrusion Detection System (IDS), and new signatures are generated clustering those which remain unknown for the IDS. Furthermore, the framework provides a mechanism to cluster the alarms produced by the IDS producing a correlated vision of the traffc observed. Both the automatic signature generation and the alarm clusters are accomplished using data mining techniques. © 2009 IEEE.
Diego Zamboni, James Riordan, et al.
SRUTI 2007
Jan Camenisch, Thomas Groß, et al.
CCS 2008
Waseem Daher, Ran Canetti
CCS 2008
Martim Carbone, Wenke Lee, et al.
IEEE Security and Privacy