2006 IEEE International Conference on Communications 2006
DOI: 10.1109/icc.2006.255123
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Signature-Based Approach for Automatic Detection of Internet Worms over Large-Scale Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2006
2006
2014
2014

Publication Types

Select...
3
2

Relationship

3
2

Authors

Journals

citations
Cited by 5 publications
(10 citation statements)
references
References 14 publications
0
10
0
Order By: Relevance
“…The authors proposed a signature-based worm detection system over large scale networks in [10]. The system consists of hierarchically placed local security managers, metropolitan security managers, and a global security manager, as shown in Fig.…”
Section: Background and System Performance Metricsmentioning
confidence: 99%
See 3 more Smart Citations
“…The authors proposed a signature-based worm detection system over large scale networks in [10]. The system consists of hierarchically placed local security managers, metropolitan security managers, and a global security manager, as shown in Fig.…”
Section: Background and System Performance Metricsmentioning
confidence: 99%
“…The experiment is carried out using the results obtained during the evaluation of the worm-detection IDS proposed in [10]. During the suspicious flow collection process, the IDS extracts N S sample strings of length L S from each incoming network flow and counts the occurrence frequency of each sample string.…”
Section: A Experimental Set-upmentioning
confidence: 99%
See 2 more Smart Citations
“…In addition, a time-out period is implemented in both the lists to purge older instances of the attacks. The DMU also possesses a list of worm signatures [6] that have either already been detected in the domain or have been defined for the system.…”
Section: B Working Principle Of the Security Elementsmentioning
confidence: 99%