Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks 2008
DOI: 10.1145/1460877.1460895
|View full text |Cite
|
Sign up to set email alerts
|

Containment of network worms via per-process rate-limiting

Abstract: Network worms pose a serious threat to the Internet infrastructure as well as end-users. Various techniques have been proposed for detection of, and response against worms. A frequently-used and automated response mechanism is to rate-limit outbound worm traffic while maintaining the operation of legitimate applications, offering a gentler alternative to the usual detect-and-block approach. However, most rate-limiting schemes to date only focus on host-level network activities and impose a single threshold on … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…As demonstrated Zeng et al in [12], proposed an individual host-level preservation system. Each hostspecific containment system includes two elements: i) behaviour analysis component and ii) containment model.…”
Section: Botnet Detection At the Host Sidementioning
confidence: 94%
“…As demonstrated Zeng et al in [12], proposed an individual host-level preservation system. Each hostspecific containment system includes two elements: i) behaviour analysis component and ii) containment model.…”
Section: Botnet Detection At the Host Sidementioning
confidence: 94%
“…In [12], Zeng et al proposed a per-process level containment technique for each host in the monitored network. e per-process containment consists of two components: behavior analysis component and containment model.…”
Section: Botnet Detection At the Host Sidementioning
confidence: 99%
“…However, our proposed solution, which is hybrid solution based on network and host analysis, outperforms existing solutions in terms of accuracy rate and false positive rate. e works in [9,12] utilize the effectiveness of host level analysis for more accurate results. ese approaches, as our approach, monitored registry and file system in each host.…”
Section: Comparisonmentioning
confidence: 99%