References
- E. Rescorla, “Security Holes... Who Cares?” Proc. 12th USENIX Security Symposium, Aug. 2003, pp. 75-90.
- J.R. Crandall, Z. Su, and S.F. Wu, “Intrusion Detection and Prevention: On Deriving Unknown Vulnerabilities from Zero-Day Polymorphic and Metamorphic Worm Exploits,” Proc. 12th ACM Conf. Computer and Communications Security, Nov. 2005, pp. 235-248.
- Website of Common Vulnerabilities and Exposures, http://cve.mitre.org (accessed Jan. 2008)
- J.-H. Lee et al., “PKG-MIB: Private-mib for Package-Based Linux Systems in a Large Scale Management Domain,” Lecture Notes in Computer Science, vol. 4496, May 2007, pp. 833-840.
- CERT Advisory for Code Red Worm, http://www.cert.org/advisories/CA-2001-19.html (accessed June 2009).
- CERT Advisory for Nimda Worm, http://www.cert.org/advisories/CA-2001-26.html (accessed June 2009).
- CERT Advisory for MS-SQL Worm, http://www.cert.org/advisories/CA-2003-04.html (accessed June 2009).
- H. J. Wang et al., “Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits,” Proc. ACM SIGCOMM, Aug. 2004, pp. 193-204.
- J. Newsome and D. Song, “Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software,” Proc. 12th Annual Network and Distributed System Security Symposium, Feb. 2005.
- S. Sidiroglou et al., “Building a Reactive Immune System for Software Services,” Proc. USENIX Annual Technical Conference, Apr. 2005, pp. 149-161.
- Snort, http://www.snort.org (accessed June 2009).
- Nessus, http://www.nessus.org (accessed June 2009).
- Website of Computer Emergency Response Team (CERT), http://www.cert.org (accessed Jan. 2008).
- Website of IBM Internet Security Systems (ISS), http://www.iss.net (accessed June 2009).
- W.A. Arbaugh, W.L. Fithen, and J. McHugh, “Windows of Vulnerability: A Case Study Analysis,” IEEE Computer, vol. 33, no. 12, Dec. 2000, pp. 52-59. https://doi.org/10.1109/2.889093
- A. Arora, A. Nandkumar, and R. Telang, “Does Information Security Attack Frequency Increase with Vulnerability Disclosure? An Empirical Analysis,” Information Systems Frontiers, vol. 8, no. 5, Nov. 2006, pp. 350-362. https://doi.org/10.1007/s10796-006-9012-5
- G. Noronha Silva, “APT HOWTO,” http://www.debian.org/doc/manuals/apt-howto (accessed June 2009).
- B. Arumugam, “Ubuntu Server Guide v6.06,” https://help.ubuntu.com/ubuntu/serverguide/C (accessed June 2009).
- Website of Ubuntu security notices (USN), http://www.ubuntu.com/usn (accessed June 2009).
- R. Davies, “Firewalls, Intrusion Detection Systems and Vulnerability Assessment: A Superior Conjunction?” Network Security, vol. 2002, no. 9, Sept. 2002, pp. 8-11. https://doi.org/10.1016/S1353-4858(02)09009-8
Cited by
- Secure firmware validation and update for consumer devices in home networking vol.62, pp.1, 2016, https://doi.org/10.1109/tce.2016.7448561
- Maximum correlation based mutual information scheme for intrusion detection in the data networks vol.189, pp.None, 2022, https://doi.org/10.1016/j.eswa.2021.116089