{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:26:35Z","timestamp":1725495995065},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540768357"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-76843-2_44","type":"book-chapter","created":{"date-parts":[[2007,11,20]],"date-time":"2007-11-20T20:07:44Z","timestamp":1195589264000},"page":"1752-1769","source":"Crossref","is-referenced-by-count":4,"title":["SWorD\u2013 A Simple Worm Detection Scheme"],"prefix":"10.1007","author":[{"given":"Matthew","family":"Dunlop","sequence":"first","affiliation":[]},{"given":"Carrie","family":"Gates","sequence":"additional","affiliation":[]},{"given":"Cynthia","family":"Wong","sequence":"additional","affiliation":[]},{"given":"Chenxi","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"44_CR1","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MSP.2005.106","volume":"3","author":"M. Bailey","year":"2005","unstructured":"Bailey, M., Cooke, E., Jahanian, F., Nazario, J., Watson, D.: The blaster worm: Then and now. IEEE Security and Privacy Magazine\u00a03(4), 26\u201331 (2005)","journal-title":"IEEE Security and Privacy Magazine"},{"key":"44_CR2","doi-asserted-by":"crossref","unstructured":"Brumley, D., Newsome, J., Song, D., Jha, S.: Towards Automatic Generation of Vulnerability-Based Signatures. In: IEEE Symposium on Security and Privacy, Oakland, CA, USA (May 2006)","DOI":"10.21236\/ADA462599"},{"key":"44_CR3","doi-asserted-by":"crossref","unstructured":"Chen, S., Tang, Y.: Slowing down Internet worms. In: Proceedings of 24th International Conference on Distributed Computing Systems, Tokyo, Japan (2004)","DOI":"10.1109\/ICDCS.2004.1281596"},{"key":"44_CR4","unstructured":"Cormen, Leiserson, Rivest: Introduction to Algorithms, 1st edn. MIT Press, Cambridge (1990)"},{"key":"44_CR5","unstructured":"Dunlop, M.: Anomaly detection in network traffic and automatic filtering. Master\u2019s thesis, Carnegie Mellon University (2006)"},{"key":"44_CR6","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1145\/1179542.1179557","volume-title":"WORM 2006","author":"P. Gopalan","year":"2006","unstructured":"Gopalan, P., Jamieson, K., Mavrommatis, P., Poletto, M.: Signature metrics for accurate and automated worm detection. In: WORM 2006. Proceedings of the 4th ACM workshop on Recurring malcode, pp. 65\u201372. ACM Press, New York (2006)"},{"key":"44_CR7","doi-asserted-by":"crossref","unstructured":"Jung, J., Paxon, V., Berger, A.W., Balakrishman, H.: Fast portscan detection using sequential hypothesis testing. In: Proceedings of 2004 IEEE Symposium on Security and Privacy (2004)","DOI":"10.1109\/SECPRI.2004.1301325"},{"key":"44_CR8","unstructured":"Jung, J., Paxson, V., Berger, A.W., Balakrishnan, H.: Fast Portscan Detection Using Sequential Hypothesis Testing. In: IEEE Symposium on Security and Privacy 2004, Oakland, CA (May 2004)"},{"key":"44_CR9","unstructured":"Kim, H.-A., Karp, B.: Autograph: Toward automated, distributed worm signature detection. In: Proceedings of the 13 th USENIX Security Symposium, San Diego, California, USA (August 2004)"},{"key":"44_CR10","unstructured":"Newsome, J., Karp, B., Song, D.: Polygraph, Automatically Generating Signatures for Polymorphic Worms. In: IEEE Symposium on Security and Privacy, Oakland, CA (May 2005)"},{"key":"44_CR11","unstructured":"Qiu, F., Liu, Z., Cho, J.: Analysis of user web traffic with a focus on search activities. In: WebDB. the 8th International Workshop on the Web & Databases, pp. 103\u2013108 (June 2005)"},{"key":"44_CR12","series-title":"Lecture Notes in Computer Science","volume-title":"Recent Advances in Intrusion Detection","author":"S.E. Schechter","year":"2006","unstructured":"Schechter, S.E., Jung, J., Berger, A.W.: Fast detection of scanning worm infections. In: Zamboni, D., Kruegel, C. (eds.) RAID 2006. LNCS, vol.\u00a04219, Springer, Heidelberg (2006)"},{"key":"44_CR13","unstructured":"Singh, S., Estan, C., Varghese, G., Savage, S.: Automated worm fingerprinting. In: Proceedings of the 6th ACM\/USENIX Symposium on Operating System Design and Implementation (December 2004)"},{"key":"44_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11767480_1","volume-title":"Applied Cryptography and Network Security","author":"A. Studer","year":"2006","unstructured":"Studer, A., Wang, C.: Fast detection of local scanners using adaptive methods. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol.\u00a03989, Springer, Heidelberg (2006)"},{"key":"44_CR15","unstructured":"Symantec. W32.Blaster.Worm. World Wide Web, http:\/\/securityresponse.symantec.com\/avcenter\/venc\/data\/ w32.blaster.worm.html"},{"key":"44_CR16","unstructured":"Symantec. W32.Welchia.Worm. World Wide Web, http:\/\/securityresponse.symantec.com\/avcenter\/venc\/data\/ w32.welchia.worm.html"},{"key":"44_CR17","doi-asserted-by":"crossref","unstructured":"Valdes, A.: Entropy characteristics of propagating Internet phenomena. In: The Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection (2003)","DOI":"10.1145\/1029208.1029228"},{"key":"44_CR18","doi-asserted-by":"crossref","unstructured":"Venkataraman, S., Song, D., Gibbons, P.B., Blum, A.: New streaming algorithms for fast detection of superspreaders. In: NDSS. Proceedings of the 12 th Network and Distributed System Security Symposium (February 2005)","DOI":"10.21236\/ADA461026"},{"key":"44_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/11663812_12","volume-title":"Recent Advances in Intrusion Detection","author":"K. Wang","year":"2006","unstructured":"Wang, K., Cretu, G., Stolfo, S.J.: Anomalous payload-based worm detection and signature generation. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol.\u00a03858, pp. 227\u2013246. Springer, Heidelberg (2006)"},{"key":"44_CR20","unstructured":"Weaver, N., Staniford, S., Paxson, V.: Very fast containment of scanning worms. In: Proceedings of the 13 th USENIX Security Symposium (2004)"},{"key":"44_CR21","unstructured":"Williamson, M.M.: Throttling viruses: Restricting propagation to defeat malicious mobile code. In: Proceedings of the 18th Annual Computer Security Applications Conference, Las Vegas, Nevada (December 2002)"},{"key":"44_CR22","doi-asserted-by":"crossref","unstructured":"Williamson, M.M.: Design, implementation and test of an email virus throttle. In: Proceedings of the 19th Annual Computer Security Applications Conference, Las Vegas, Nevada (December 2003)","DOI":"10.1109\/CSAC.2003.1254312"},{"key":"44_CR23","doi-asserted-by":"crossref","unstructured":"Wong, C., Wang, C., Song, D., Bielski, S.M., Ganger, G.R.: Dynamic quarantine of Internet worms. In: Proceedings of DSN 2004, Florence, Italy (June 2004)","DOI":"10.1109\/DSN.2004.1311878"}],"container-title":["Lecture Notes in Computer Science","On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-76843-2_44.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,14]],"date-time":"2023-05-14T17:28:37Z","timestamp":1684085317000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-76843-2_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540768357"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-76843-2_44","relation":{},"subject":[]}}