{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T13:07:51Z","timestamp":1761743271220,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,9,22]],"date-time":"2008-09-22T00:00:00Z","timestamp":1222041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-0523932"],"award-info":[{"award-number":["CNS-0523932"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,9,22]]},"DOI":"10.1145\/1460877.1460895","type":"proceedings-article","created":{"date-parts":[[2009,9,28]],"date-time":"2009-09-28T17:33:43Z","timestamp":1254159223000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Containment of network worms via per-process rate-limiting"],"prefix":"10.1145","author":[{"given":"Yuanyuan","family":"Zeng","sequence":"first","affiliation":[{"name":"The University of Michigan, Ann Arbor, Michigan"}]},{"given":"Xin","family":"Hu","sequence":"additional","affiliation":[{"name":"The University of Michigan, Ann Arbor, Michigan"}]},{"given":"Haixiong","family":"Wang","sequence":"additional","affiliation":[{"name":"The University of Michigan, Ann Arbor, Michigan"}]},{"given":"Kang G.","family":"Shin","sequence":"additional","affiliation":[{"name":"The University of Michigan, Ann Arbor, Michigan"}]},{"given":"Abhijit","family":"Bose","sequence":"additional","affiliation":[{"name":"IBM T.J. Watson Research, Hawthorne, New York"}]}],"member":"320","published-online":{"date-parts":[[2008,9,22]]},"reference":[{"volume-title":"Symantec internet security threat report highlights rise in threats to confidential information. www.symantec.com\/press\/2005\/n050321.html","year":"2005","key":"e_1_3_2_1_1_1","unstructured":"Symantec. Symantec internet security threat report highlights rise in threats to confidential information. www.symantec.com\/press\/2005\/n050321.html , 2005 . Symantec. Symantec internet security threat report highlights rise in threats to confidential information. www.symantec.com\/press\/2005\/n050321.html, 2005."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.20"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the 15th USENIX Security Symposium","author":"Kirda E.","year":"2006","unstructured":"E. Kirda , C. Kruegel , G. Banks , G. Vigna , and R. Kemmerer . Behavior-based spyware detection . In Proceedings of the 15th USENIX Security Symposium , 2006 . E. Kirda, C. Kruegel, G. Banks, G. Vigna, and R. Kemmerer. Behavior-based spyware detection. In Proceedings of the 15th USENIX Security Symposium, 2006."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/525080.884258"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the USENIX Security Symposium","author":"Somayaji A.","year":"2000","unstructured":"A. Somayaji and S. Forrest . Automated response using system-call delays . In Proceedings of the USENIX Security Symposium , 2000 . A. Somayaji and S. Forrest. Automated response using system-call delays. In Proceedings of the USENIX Security Symposium, 2000."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/882495.884433"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.34"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of The 18th ACSAC","author":"Williamson M.","year":"2002","unstructured":"M. Williamson . Throttling viruses : Restricting propagation to defeat malicious mobile code . In Proceedings of The 18th ACSAC , 2002 . M. Williamson. Throttling viruses: Restricting propagation to defeat malicious mobile code. In Proceedings of The 18th ACSAC, 2002."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/977400.977961"},{"volume-title":"Proceedings of RAID, 04","author":"Schechter S. E.","key":"e_1_3_2_1_10_1","unstructured":"S. E. Schechter , J. Jung , and A. W. Berger . Fast detection of scanning worm infections . In Proceedings of RAID, 04 . S. E. Schechter, J. Jung, and A. W. Berger. Fast detection of scanning worm infections. In Proceedings of RAID, 04."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2006.6"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of IEEE Symposium on Security and Privacy","author":"Lee W.","year":"1999","unstructured":"W. Lee , S. Stolfo , and K. Mok . A data mining framework for building intrusion detection models . In Proceedings of IEEE Symposium on Security and Privacy , 1999 . W. Lee, S. Stolfo, and K. Mok. A data mining framework for building intrusion detection models. In Proceedings of IEEE Symposium on Security and Privacy, 1999."},{"key":"e_1_3_2_1_13_1","volume-title":"The earlybird system for real-time detection of unknown worms. Technical report","author":"Singh S.","year":"2003","unstructured":"S. Singh , C. Estan , G. Varghese , and S. Savage . The earlybird system for real-time detection of unknown worms. Technical report , University of California , San Diego , 2003 . S. Singh, C. Estan, G. Varghese, and S. Savage. The earlybird system for real-time detection of unknown worms. Technical report, University of California, San Diego, 2003."},{"key":"e_1_3_2_1_14_1","volume-title":"Behavioral classification","author":"Lee T.","year":"2006","unstructured":"T. Lee and J. J. Mody . Behavioral classification , 2006 . T. Lee and J. J. Mody. Behavioral classification, 2006."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/11663812_2"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of NDSS","author":"Whyte D.","year":"2005","unstructured":"D. Whyte , E. Kranakis , and P. V. Oorschot . Dns-based detection of scanning worms in an enterprise network . In Proceedings of NDSS , 2005 . D. Whyte, E. Kranakis, and P. V. Oorschot. Dns-based detection of scanning worms in an enterprise network. In Proceedings of NDSS, 2005."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-2440-0","volume-title":"The Nature of Statistical Learning Theory","author":"Vapnik V.","year":"1995","unstructured":"V. Vapnik . The Nature of Statistical Learning Theory . Springer , 1995 . V. Vapnik. The Nature of Statistical Learning Theory. Springer, 1995."},{"key":"e_1_3_2_1_18_1","volume-title":"Advances in Kernel Methods: Support Vector Machines","author":"Joachims T.","year":"1998","unstructured":"T. Joachims . Making large-scale support vector machine learning practical . In B. Scholkopf, C. Burges, and A. Smola, editors, Advances in Kernel Methods: Support Vector Machines . MIT Press , Cambridge, MA , 1998 . T. Joachims. Making large-scale support vector machine learning practical. In B. Scholkopf, C. Burges, and A. Smola, editors, Advances in Kernel Methods: Support Vector Machines. MIT Press, Cambridge, MA, 1998."},{"key":"e_1_3_2_1_19_1","volume-title":"A note on platt's probabilistic outputs for support vector machines","author":"Lin H.","year":"2003","unstructured":"H. Lin , C. Lin , and R. Weng . A note on platt's probabilistic outputs for support vector machines , 2003 . H. Lin, C. Lin, and R. Weng. A note on platt's probabilistic outputs for support vector machines, 2003."},{"key":"e_1_3_2_1_20_1","unstructured":"Change of variables theorem. http:\/\/mathworld.wolfram.com\/ChangeofVariablesTheorem.html.  Change of variables theorem. http:\/\/mathworld.wolfram.com\/ChangeofVariablesTheorem.html."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"e_1_3_2_1_22_1","unstructured":"Regmon. www.microsoft.com\/technet\/sysinternals\/utilities\/regmon.mspx.  Regmon. www.microsoft.com\/technet\/sysinternals\/utilities\/regmon.mspx."},{"key":"e_1_3_2_1_23_1","unstructured":"Api hooking revealed. http:\/\/www.codeproject.com\/system\/hooksys.asp.  Api hooking revealed. http:\/\/www.codeproject.com\/system\/hooksys.asp."},{"key":"e_1_3_2_1_24_1","unstructured":"Passmark. http:\/\/www.passmark.com\/.  Passmark. http:\/\/www.passmark.com\/."},{"key":"e_1_3_2_1_25_1","unstructured":"Rootkitrevealer. http:\/\/www.microsoft.com\/technet\/sysinternals\/Utilities\/RootkitRevealer.mspx.  Rootkitrevealer. http:\/\/www.microsoft.com\/technet\/sysinternals\/Utilities\/RootkitRevealer.mspx."},{"key":"e_1_3_2_1_26_1","unstructured":"Lagrande technology architectural overview 2003.  Lagrande technology architectural overview 2003."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945464"}],"event":{"name":"Securecomm08: Fourth International Conference On Security on Privacy for communication Networks","sponsor":["Create-Net","INRIA Institut Natl de Recherche en Info et en Automatique","SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Istanbul Turkey","acronym":"Securecomm08"},"container-title":["Proceedings of the 4th international conference on Security and privacy in communication netowrks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1460877.1460895","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1460877.1460895","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:43:49Z","timestamp":1750290229000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1460877.1460895"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,9,22]]},"references-count":27,"alternative-id":["10.1145\/1460877.1460895","10.1145\/1460877"],"URL":"https:\/\/doi.org\/10.1145\/1460877.1460895","relation":{},"subject":[],"published":{"date-parts":[[2008,9,22]]},"assertion":[{"value":"2008-09-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}