{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T15:48:27Z","timestamp":1742399307443},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540736134"},{"type":"electronic","value":"9783540736141"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-73614-1_11","type":"book-chapter","created":{"date-parts":[[2007,9,12]],"date-time":"2007-09-12T23:09:45Z","timestamp":1189638585000},"page":"175-192","source":"Crossref","is-referenced-by-count":12,"title":["On the Adaptive Real-Time Detection of Fast-Propagating Network Worms"],"prefix":"10.1007","author":[{"given":"Jaeyeon","family":"Jung","sequence":"first","affiliation":[]},{"given":"Rodolfo A.","family":"Milito","sequence":"additional","affiliation":[]},{"given":"Vern","family":"Paxson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"Nmap \u2014 free security scanner for network exploration & security audits, \n                    \n                      http:\/\/www.insecure.org\/nmap\/"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Chen, S., Tang, Y.: Slowing Down Internet Worms. In: Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004) Tokyo, Japan (March 2004)","DOI":"10.1109\/ICDCS.2004.1281596"},{"key":"11_CR3","unstructured":"Ehtereal.com. Ethereal, \n                    \n                      http:\/\/www.ethereal.com\/"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Eichin, M.W., Rochlis, J.A.: With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988. In: Proceedings of the IEEE Symposium on Research in Security and Privacy (1989)","DOI":"10.1109\/SECPRI.1989.36307"},{"key":"11_CR5","unstructured":"F-Secure. F-Secure Virus Descriptions: Santy, \n                    \n                      http:\/\/www.f-secure.com\/v-descs\/santy_a.shtml"},{"key":"11_CR6","unstructured":"Jung, J., Paxson, V., Berger, A.\u00a0W., and Balakrishnan, H. Fast Portscan Detection Using Sequential Hypothesis Testing. In: Proceedings of the IEEE Symposium on Security and Privacy (May 9\u201312, 2004)"},{"key":"11_CR7","unstructured":"Kim, H.-A., Karp, B.: Autograph: Toward Automated Distributed Worm Signature Detection. In: Proceedings of the 13th USENIX Security Symposium (August 9\u201313, 2004)"},{"key":"11_CR8","series-title":"Lecture Notes in Computer Science","volume-title":"Recent Advances in Intrusion Detection","author":"S.E. Schechter","year":"2004","unstructured":"Schechter, S.E., Jung, J., Berger, A.W.: Fast Detection of Scanning Worm Infections. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol.\u00a03224, Springer, Heidelberg (2004)"},{"key":"11_CR9","unstructured":"Singh, S., Estan, C., Varghese, G., and Savage, S. Automated Worm Fingerprinting. In: Proceedings of the 13th Operating Systems Design and Implementation OSDI (December 2004)"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Spafford, E.\u00a0H. A Failure to Learn from the Past. In: Proceedings of the 19th Annual Computer Security Applications Conference. December 8\u201312, 2003 pp.\u00a0217\u2013233 (2003)","DOI":"10.1109\/CSAC.2003.1254327"},{"key":"11_CR11","unstructured":"Staniford, S., Paxson, V., Weaver, N.: How to 0wn the Internet in Your Spare Time. In: Proceedings of the 11th USENIX Security Symposium Berkeley, CA, USA, August 5\u20139, 2002 USENIX Association, pp. 149\u2013170 (2002)"},{"key":"11_CR12","unstructured":"Turkey, J.W.: A survey of sampling from contaminated distributions. In: Contributions to Probability and Statistics, Stanford University Press (1960)"},{"key":"11_CR13","unstructured":"Twycross, J., Williamson, M.M.: Implementing and Testing a Virus Throttle. In: Proceedings of the 12th USENIX Security Symposium (August 4\u20138, 2003)"},{"key":"11_CR14","volume-title":"Sequential Analysis","author":"A. Wald","year":"1947","unstructured":"Wald, A.: Sequential Analysis. J. Wiley & Sons, New York (1947)"},{"key":"11_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11663812_12","volume-title":"Recent Advances in Intrusion Detection","author":"K. Wang","year":"2006","unstructured":"Wang, K., Cretu, G., Stolfo, S.J: Anomalous payload-based worm detection and signature generation. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol.\u00a03858, Springer, Heidelberg (2006)"},{"key":"11_CR16","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/948187.948190","volume-title":"Proceedings of the 2003 ACM Workshop on Rapid Malcode","author":"N. Weaver","year":"2003","unstructured":"Weaver, N., Paxson, V., Staniford, S., Cunningham, R.: A Taxonomy of Computer Worms. In: Proceedings of the 2003 ACM Workshop on Rapid Malcode, October 27, 2003, pp. 11\u201318. ACM Press, New York (2003)"},{"key":"11_CR17","unstructured":"Weaver, N., Staniford, S., and Paxson, V. Very Fast Containment of Scanning Worms. In: Proceedings of the 13th USENIX Security Symposium (August 9\u201313, 2004)"},{"key":"11_CR18","unstructured":"Whyte, D., Kranakis, E., van Oorschot, P.: DNS-based Detection of Scanning Worms in an Enterprise Network. In: Proceedings of the Network and Distributed System Security Symposium (NDSS 2005) (February 2005)"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Williamson, M.\u00a0M. Throttling Viruses: Restricting propagation to defeat malicious mobile code. In: Proceedings of The 18th Annual Computer Security Applications Conference (ACSAC 2002) (December 9\u201313, 2002)","DOI":"10.1109\/CSAC.2002.1176279"},{"key":"11_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11663812_2","volume-title":"Recent Advances in Intrusion Detection","author":"C. Wong","year":"2006","unstructured":"Wong, C., Bielski, S., Studer, A., Wang, C.: Empirical analysis of rate limiting mechanisms. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol.\u00a03858, Springer, Heidelberg (2006)"}],"container-title":["Lecture Notes in Computer Science","Detection of Intrusions and Malware, and Vulnerability Assessment"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-73614-1_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,23]],"date-time":"2019-02-23T09:09:03Z","timestamp":1550912943000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-73614-1_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540736134","9783540736141"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-73614-1_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}