The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
DTA(동적 오염 분석)를 통한 소프트웨어 공격 탐지는 프로그램 실행의 높은 적용 범위를 지원하지만 모니터링되는 프로그램의 성능을 엄청나게 저하시킵니다. 이 편지는 AC(애플리케이션 커뮤니티) 구성원 간의 공동 동적 오염 분석 가능성을 탐구합니다. AC의 모든 인스턴스에서 모든 요청을 완전히 모니터링하는 대신 각 구성원은 들어오는 요청의 일부에 대해 DTA를 사용하여 부담을 줄입니다. 헤비급 모니터링. Apache 웹 서버 기반의 테스트 AC를 사용한 실험 결과는 중간 규모의 애플리케이션 커뮤니티에서 웜 발생의 신속한 탐지가 가능하다는 것을 보여줍니다.즉, 250 - 500).
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
부
Hyung Chan KIM, Angelos KEROMYTIS, "On the Deployment of Dynamic Taint Analysis for Application Communities" in IEICE TRANSACTIONS on Information,
vol. E92-D, no. 3, pp. 548-551, March 2009, doi: 10.1587/transinf.E92.D.548.
Abstract: Although software-attack detection via dynamic taint analysis (DTA) supports high coverage of program execution, it prohibitively degrades the performance of the monitored program. This letter explores the possibility of collaborative dynamic taint analysis among members of an application community (AC): instead of full monitoring for every request at every instance of the AC, each member uses DTA for some fraction of the incoming requests, thereby loosening the burden of heavyweight monitoring. Our experimental results using a test AC based on the Apache web server show that speedy detection of worm outbreaks is feasible with application communities of medium size (i.e., 250-500).
URL: https://global.ieice.org/en_transactions/information/10.1587/transinf.E92.D.548/_p
부
@ARTICLE{e92-d_3_548,
author={Hyung Chan KIM, Angelos KEROMYTIS, },
journal={IEICE TRANSACTIONS on Information},
title={On the Deployment of Dynamic Taint Analysis for Application Communities},
year={2009},
volume={E92-D},
number={3},
pages={548-551},
abstract={Although software-attack detection via dynamic taint analysis (DTA) supports high coverage of program execution, it prohibitively degrades the performance of the monitored program. This letter explores the possibility of collaborative dynamic taint analysis among members of an application community (AC): instead of full monitoring for every request at every instance of the AC, each member uses DTA for some fraction of the incoming requests, thereby loosening the burden of heavyweight monitoring. Our experimental results using a test AC based on the Apache web server show that speedy detection of worm outbreaks is feasible with application communities of medium size (i.e., 250-500).},
keywords={},
doi={10.1587/transinf.E92.D.548},
ISSN={1745-1361},
month={March},}
부
TY - JOUR
TI - On the Deployment of Dynamic Taint Analysis for Application Communities
T2 - IEICE TRANSACTIONS on Information
SP - 548
EP - 551
AU - Hyung Chan KIM
AU - Angelos KEROMYTIS
PY - 2009
DO - 10.1587/transinf.E92.D.548
JO - IEICE TRANSACTIONS on Information
SN - 1745-1361
VL - E92-D
IS - 3
JA - IEICE TRANSACTIONS on Information
Y1 - March 2009
AB - Although software-attack detection via dynamic taint analysis (DTA) supports high coverage of program execution, it prohibitively degrades the performance of the monitored program. This letter explores the possibility of collaborative dynamic taint analysis among members of an application community (AC): instead of full monitoring for every request at every instance of the AC, each member uses DTA for some fraction of the incoming requests, thereby loosening the burden of heavyweight monitoring. Our experimental results using a test AC based on the Apache web server show that speedy detection of worm outbreaks is feasible with application communities of medium size (i.e., 250-500).
ER -