First IEEE International Workshop on Critical Infrastructure Protection (IWCIP'05)
DOI: 10.1109/iwcip.2005.2
|View full text |Cite
|
Sign up to set email alerts
|

A Framework for Real-Time Worm Attack Detection and Backbone Monitoring

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(12 citation statements)
references
References 2 publications
0
12
0
Order By: Relevance
“…The approach adopted by Wagner et al [154], for example, can naturally be extended to worms, as well as the ones of Gao et al [56] and Zhao et al [159] (Sections 3.1 and 3.2). Dübendorfer et al [38] and Wagner et al [39] attempt to characterize the host behavior on the basis of incoming and outgoing connections. The proposed algorithm assigns the hosts of a network to a set of predefined classes: the traffic class, the connector class and the responder class.…”
Section: Wormsmentioning
confidence: 99%
See 1 more Smart Citation
“…The approach adopted by Wagner et al [154], for example, can naturally be extended to worms, as well as the ones of Gao et al [56] and Zhao et al [159] (Sections 3.1 and 3.2). Dübendorfer et al [38] and Wagner et al [39] attempt to characterize the host behavior on the basis of incoming and outgoing connections. The proposed algorithm assigns the hosts of a network to a set of predefined classes: the traffic class, the connector class and the responder class.…”
Section: Wormsmentioning
confidence: 99%
“…As for payload-based solution, the anomaly-/misuse-based classes play an important role: we can see contributions in both fields. Some researchers, such as Münz et al [110], Düben-dorfer et al [38] and Wagner et al [39], developed compound methods. This is due to the interest in combining the strengths of both anomaly and misusebased approaches, as well as to the increasing interest in multi-purpose platforms that offer a shared base for different detection modules.…”
Section: Solutions Classificationmentioning
confidence: 99%
“…Related tools are Gigascope [4] for packet trace processing, the TelgraphCQ DSMS [5] or the network monitoring specific CoMo project [6]. Other tools focus on the dispatching of received NetFlow data [7] or on Flow Query Languages [8]. The presented tools are often limited to a certain domain and not suitable for extracting and correlating network characteristics or data from different data sources.…”
Section: Existing Processing Toolsmentioning
confidence: 99%
“…Under the realistic assumption that each Netflow or IPFIX packet contains multiple records, this is still below our measured maximum even though we do not know whether special care is necessary if the data is received in short bursts. A possible countermeasure against bursty Netflow traffic is traffic shaping as applied in Thomas Diibendorfer's UPFrame [18].…”
Section: Performance Measurementsmentioning
confidence: 99%
“…Real-time analysis of UDP payload can be accomplished with UDFrame [18]. Thomas Diibendorfer and Arno Wagner developed this framework in parallel to our work and used it to process Netflow.v5 data.…”
Section: Related Workmentioning
confidence: 99%