{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T13:03:53Z","timestamp":1742389433709},"publisher-location":"Boston, MA","reference-count":37,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387327204"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-44599-1_6","type":"book-chapter","created":{"date-parts":[[2007,3,4]],"date-time":"2007-03-04T15:35:08Z","timestamp":1173022508000},"page":"113-145","source":"Crossref","is-referenced-by-count":11,"title":["Very Fast Containment of Scanning Worms, Revisited"],"prefix":"10.1007","author":[{"given":"Nicholas","family":"Weaver","sequence":"first","affiliation":[]},{"given":"Stuart","family":"Staniford","sequence":"additional","affiliation":[]},{"given":"Vern","family":"paxson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"R. Anderson, E. Biham, and L. Knudsen. Serpent: A Proposal for the Advanced Encryption Standard."},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"B. Bloom. Space_Time Trade-offs in Hash Coding with Allowable Errors. CACM, July 1970.","DOI":"10.1145\/362686.362692"},{"key":"6_CR3","unstructured":"CERT. CERT Advisory CA-2001-26 Nimda Worm, http:\/\/www.cert.org\/advisories\/ca-2001-26.html."},{"key":"6_CR4","unstructured":"CERT. Code Red 11: Another Worm Exploiting Buffer Overflow in IIS Indexing Service DLL, http:\/\/www.cert.org\/incident-notes\/in-2001-09.html."},{"key":"6_CR5","unstructured":"S. Crosby and D. Wallach. Denial of Service via Algorithmic Complexity Attacks. In Proceedings of the 12th USENIX Security Symposium. USENIX, August 2003."},{"key":"6_CR6","unstructured":"Deter: A laboratory for security research, http:\/\/www.isi.edu\/deter\/."},{"key":"6_CR7","unstructured":"eEye Digital Security..ida \u201cCode Red\u201d Worm, http:\/\/www.eeye.corn\/htmVResearch\/ Advisories\/AL20010717.htrnl."},{"key":"6_CR8","unstructured":"K. Egevang and P. Francis. Rfc 1631-the ip network address translator (nat)."},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"L. T. Heberlein, G. Dias, K. Levitt, B. Mukerjee, J. Wood, and D. Wolber. A Network Security Monitor. In Proceedings of the IEEE Symopisum on Research in Security and Privacy, 1990.","DOI":"10.1109\/RISP.1990.63859"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"J. Jung, V. Paxson, A. W. Berger, and H. Balakrishnan. Fast Portscan Detection Using Sequential Hypothesis Testing. In 2004 IEEE Symposium on Security and Privacy, to appear, 2004.","DOI":"10.1109\/SECPRI.2004.1301325"},{"key":"6_CR11","unstructured":"J. Jung, S. Schechter, and A. Berger. Fast Detection of Scanning Worm Infections, in submission."},{"issue":"3","key":"6_CR12","first-page":"264","volume":"18","author":"E. KoNer","year":"2000","unstructured":"E. KoNer, R. Morris, B. Chen, J. Jannotti, and M. F. Kaashoek. The click modular router. ACM Transactions on Computer Systems, 18(3):264\u2013297, August 2000.","journal-title":"ACM Transactions on Computer Systems"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"C. Leckie and R. Kotagiri. A Probabilistic Approach to Detecting Network Scans. In Proceedings of the Eighth IEEE Network Operations and Management Symposium (NOMS 2002), 2002.","DOI":"10.1109\/NOMS.2002.1015594"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. Inside the Slammer Worm. IEEE Magazine of Security and Privacy, pages 33\u201339, July\/August 2003 2003.","DOI":"10.1109\/MSECP.2003.1219056"},{"key":"6_CR15","unstructured":"D. Moore, C. Shannon, G. M. Voelker, and S. Savage. Internet Quarantine: Requirements for Containing Self-propagating Code, 2003."},{"key":"6_CR16","unstructured":"M. Networks. http:\/\/www.rniragenetworks.com\/."},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"D. Nojiri, J. Rowe, and K. Levitt. Cooperative Response Strategies for Large Scale Attack Mitigation. In Proc. DARPA DISCEXIII Conference, 2003.","DOI":"10.1109\/DISCEX.2003.1194893"},{"key":"6_CR18","unstructured":"H. Packard. Connection-rate filtering based on virus-trottling tecnology, http:\/\/www.hp.com\/rnd\/pdf_html\/virus-throttling_tech_brief.htm."},{"issue":"23-24","key":"6_CR19","doi-asserted-by":"publisher","first-page":"2435","DOI":"10.1016\/S1389-1286(99)00112-7","volume":"31","author":"V. Paxson","year":"1999","unstructured":"V. Paxson. Bro: a System for Detecting Network iItruders in Real-Time. Computer Networks, 31(23-24):2435\u20132463,1999.","journal-title":"Computer Networks"},{"key":"6_CR20","unstructured":"D. Plummer. Rfc 826-ethemet address resolution protocol."},{"key":"6_CR21","unstructured":"G. Project. Gnutella, A Protocol for Revolution, http:\/\/rfc-gnutella.sourceforge.net\/."},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"S. Robertson, E. V. Siegel, M. Miller, and S. J. Stolfo. Surveillance Detection in High Bandwidth Environments. In Proc. DARPA DISCEX III Conference, 2003.","DOI":"10.1109\/DISCEX.2003.1194879"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"S. E. Schechter, J. Jung, and A. W. Berger. Fast Detection of Scanning Worm Infections. In Proceedings of the Seventh International Symposium on Recent Advances in Intrusion Detection (RAID 2004), Sept. 15-17,2004.","DOI":"10.1007\/978-3-540-30143-1_4"},{"key":"6_CR24","unstructured":"Silicon Defense. Countermalice Worm Containment, http:\/\/www.silicondefense.com\/ products\/countermalice\/."},{"key":"6_CR25","unstructured":"Snort.org. Snort, the Open Source Network Intrusion Detection System, http:\/\/www.snort.org\/."},{"key":"6_CR26","unstructured":"S. Staniford. Containment of Scanning Worms in Enterprise Networks. Journal of Computer Security, to appear, 2004."},{"key":"6_CR27","doi-asserted-by":"crossref","first-page":"105","DOI":"10.3233\/JCS-2002-101-205","volume":"10","author":"S. Staniford","year":"2002","unstructured":"S. Staniford, J. Hoagland, and J. McAlemey. Practical Automated Detection of Stealthy Portscans. Journal of Computer Security, 10: 105\u2013136,2002.","journal-title":"Journal of Computer Security"},{"key":"6_CR28","unstructured":"S. Staniford and C. Kahn. Worm Containment in the Internal Network. Technical report, Silicon Defense, 2003."},{"key":"6_CR29","unstructured":"S. Staniford, V. Paxson, and N. Weaver. How to Own the Internet in Your Spare Time. In Proceedings of the 11th USENlX Security Symposium. USENIX, August 2002."},{"key":"6_CR30","unstructured":"Symantec. W32.blaster.worm, http:\/\/securityresponse.symantec.com\/avcen_r\/venc\/datdw32.blaster.worm.html."},{"key":"6_CR31","doi-asserted-by":"crossref","unstructured":"J. Vwycross and M. M. Williamson. Implementing and Testing a Virus Throttle. In Proceedings of the 12th USENIXSecurity Symposium. USENIX, August 2003.","DOI":"10.1109\/CSAC.2003.1254312"},{"key":"6_CR32","doi-asserted-by":"crossref","unstructured":"N. Weaver, V. Paxson, S. Staniford, and R. Cunningham. A Taxonomy of Computer Worms. In The First ACM Workshop on Rapid Malcode (WORM), 2003.","DOI":"10.1145\/948187.948190"},{"key":"6_CR33","doi-asserted-by":"crossref","unstructured":"B. White, J. Lepreau, L. Stoller, R. Ricci, S. Guruprasad, M. Newbold, M. Hibler, C. Barb, and A. Joglekar. An integrated experimental environment for distributed systems and networks. In Proc. of the Fzfth Symposium on Operating Systems Design and Implementation,pages 255\u2013270, Boston, MA, Dec. 2002. USENIX Association.","DOI":"10.1145\/1060289.1060313"},{"key":"6_CR34","unstructured":"D. Whyte, P. vas Oorschot, and E. Kranakis. Arp-based detection of scanning worms within an enterprise network. In In proceedings of Annual Computer Security Applications Conference (ACSAC 2005),Tucson, AZ, December 2005."},{"key":"6_CR35","unstructured":"M. M. Williamson. Throttling Viruses: Restricting Propagation to Defeat Mobile Malicious Code. In ACSAC, 2002."},{"key":"6_CR36","unstructured":"Xilinx Inc. Xilinx ML300 Development Platform, http:\/\/www.xilinx.com\/products\/boards\/ml300\/."},{"key":"6_CR37","doi-asserted-by":"crossref","unstructured":"C. C. Zou, W. Gong, and D. Towsley. Worm Propagation Modeling and Analysis under Dynamic Quarantine Defense. In The First ACM Workshop on Rapid Malcode (WORM), 2003.","DOI":"10.1145\/948187.948197"}],"container-title":["Advances in Information Security","Malware Detection"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-44599-1_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:57:06Z","timestamp":1605650226000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-44599-1_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387327204"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-44599-1_6","relation":{},"subject":[]}}