References
- ASEC Report, http://download.ahnlab.com/asecReport/ASEC_Report_Vol.60_Kor.pdf
- McAfee Report, http://www.mcafee.com/kr/resources/reports/rp-quarterly-threat-q3-2014.pdf
- J.O. Kephart and W.C. Arnold. 1994. "Automatic Extraction of Computer Virus Signatures." In Proc.of the 4th Virus Bulletin Int'l Conf. Virus Bulletin Ltd., Abingdon, pp. 178-184.
- Arnold, W. and G. Tesauro, "Automatically generated Win32 heuristic virus detection", in 10th Virus Bulletin International Conference (VB2000), pp. 51-60, 2000.
- Cohen, F.: Computer viruses. Ph.D. thesis, University of South California, 1986
- Cohen, F.B.: Computer viruses: Theory and experiments. Comput. Secur. Vol 6, No.1, pp. 22-35, 1987
- Eun Jun Yoon, Hyun Sung Kim and Ki Dong Bu, "An Intrusion Detection System Using Pattern Classification", Proceedings of the Korea Society for Industrial Systems Conference, 2002.
- Eun Jun Yoon, Hyun Sung Kim and Ki Dong Bu, "Intrusion Detection System using Pattern Classification with Hashing Technique", Journal of the Korea Industrial Information System Society, Vol. 8, No. 1, pp. 75-82, 2003.
- Hyun Chul Cha, "A Solution for Timing Gap Problems on Network Intrusion Detection Systems", Journal of the Korea Industrial Information System Society, Vol. 7, No.1, pp. 1-6, 2001.
- Seon Cheol Choi and Hyun Chul Cha, "A Detection Method for Network Intrusion using the NFR", Proceedings of the Korea Society for Industrial Systems Conference, 2001.
- Jae Min Son, Hyun Sung Kim and Ki Dong Bu, "A Scheme for Protecting Security Rules in Intrusion Detection System", Journal of the Korea Industrial Information System Society, Vol. 8, No.4, pp. 8-16, 2003.
- ClamAV, http://www.clamav.net/index.html
- Erdogan, Ozgun, and Pei Cao. "Hash-AV: fast virus signature scanning by cache-resident filters," International Journal of Security and Networks 2.1, pp. 50-59, 2007 https://doi.org/10.1504/IJSN.2007.012824
- Kandhan, Ramakrishnan, Nikhil Teletia, and Jignesh M. Patel. "SigMatch: fast and scalable multi-pattern matching." Proceedings of the VLDB Endowment 3.1-2,pp. 1173-1184, 2010
- Oberheide, Jon, Evan Cooke, and Farnam Jahanian. "CloudAV: N-Version Antivirus in the Network Cloud." USENIX Security Symposium, pp. 91-106, 2008
- Cha, Sang Kil, et al. "SplitScreen: Enabling efficient, distributed malware detection." Communications and Networks, Vol 13, No. 2, pp. 187-200, 2011 https://doi.org/10.1109/JCN.2011.6157418
- Tran Ngoc, T, Hieu T T, Ishii H, and Tomiyama S," Memory-efficient signature matching for ClamAV on FPGA.", In Communications and Electronics (ICCE), 2014 IEEE Fifth International Conference on, pp. 358-363, 2014
Cited by
- A Study on Improved Detection Signature System in Hacking Response of One-Line Games vol.21, pp.1, 2016, https://doi.org/10.7838/jsebs.2016.21.1.105
- MWMon: A Software Defined Network-based Malware Monitor vol.20, pp.5, 2015, https://doi.org/10.9723/jksiis.2015.20.5.037