Sting: An End-to-End Self-Healing System for Defending against Internet Worms View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2007-01-01

AUTHORS

David Brumley , James Newsome , Dawn Song

ABSTRACT

We increasingly rely on highly available systems in all areas of society, from the economy, to military, to the government. Unfortunately, much software, including critical applications, contains vulnerabilities unknown at the time of deployment, with memory-overwrite vulnerabilities (such as buffer overflow and format string vulnerabilities) accounting for more than 60% of total vulnerabilities [10]. These vulnerabilities, when exploited, can cause devastating effects, such as self-propagating worm attacks which can compromise millions of vulnerable hosts within a matter of minutes or even seconds [32],[61], and cause millions of dollars of damage [30]. Therefore, we need to develop effective mechanisms to protect vulnerable hosts from being compromised and allow them to continue providing critical services, even under aggressively spreading attacks on previously unknown vulnerabilities. More... »

PAGES

147-170

Book

TITLE

Malware Detection

ISBN

978-0-387-32720-4
978-0-387-44599-1

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-0-387-44599-1_7

DOI

http://dx.doi.org/10.1007/978-0-387-44599-1_7

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1042639608


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0803", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Computer Software", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Carnegie Mellon University, Pittsburgh, PA, USA", 
          "id": "http://www.grid.ac/institutes/grid.147455.6", 
          "name": [
            "Carnegie Mellon University, Pittsburgh, PA, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Brumley", 
        "givenName": "David", 
        "id": "sg:person.07667617727.70", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07667617727.70"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Carnegie Mellon University, Pittsburgh, PA, USA", 
          "id": "http://www.grid.ac/institutes/grid.147455.6", 
          "name": [
            "Carnegie Mellon University, Pittsburgh, PA, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Newsome", 
        "givenName": "James", 
        "id": "sg:person.010737772415.24", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010737772415.24"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Carnegie Mellon University, Pittsburgh, PA, USA", 
          "id": "http://www.grid.ac/institutes/grid.147455.6", 
          "name": [
            "Carnegie Mellon University, Pittsburgh, PA, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Song", 
        "givenName": "Dawn", 
        "id": "sg:person.01143152610.86", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01143152610.86"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2007-01-01", 
    "datePublishedReg": "2007-01-01", 
    "description": "We increasingly rely on highly available systems in all areas of society, from the economy, to military, to the government. Unfortunately, much software, including critical applications, contains vulnerabilities unknown at the time of deployment, with memory-overwrite vulnerabilities (such as buffer overflow and format string vulnerabilities) accounting for more than 60% of total vulnerabilities [10]. These vulnerabilities, when exploited, can cause devastating effects, such as self-propagating worm attacks which can compromise millions of vulnerable hosts within a matter of minutes or even seconds [32],[61], and cause millions of dollars of damage [30]. Therefore, we need to develop effective mechanisms to protect vulnerable hosts from being compromised and allow them to continue providing critical services, even under aggressively spreading attacks on previously unknown vulnerabilities.", 
    "editor": [
      {
        "familyName": "Christodorescu", 
        "givenName": "Mihai", 
        "type": "Person"
      }, 
      {
        "familyName": "Jha", 
        "givenName": "Somesh", 
        "type": "Person"
      }, 
      {
        "familyName": "Maughan", 
        "givenName": "Douglas", 
        "type": "Person"
      }, 
      {
        "familyName": "Song", 
        "givenName": "Dawn", 
        "type": "Person"
      }, 
      {
        "familyName": "Wang", 
        "givenName": "Cliff", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-0-387-44599-1_7", 
    "inLanguage": "en", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-0-387-32720-4", 
        "978-0-387-44599-1"
      ], 
      "name": "Malware Detection", 
      "type": "Book"
    }, 
    "keywords": [
      "vulnerable hosts", 
      "worm attacks", 
      "unknown vulnerabilities", 
      "time of deployment", 
      "self-healing system", 
      "Internet worms", 
      "critical applications", 
      "critical services", 
      "matter of minutes", 
      "areas of society", 
      "available systems", 
      "millions of dollars", 
      "attacks", 
      "effective mechanism", 
      "vulnerability", 
      "software", 
      "deployment", 
      "millions", 
      "system", 
      "services", 
      "total vulnerability", 
      "applications", 
      "military", 
      "seconds", 
      "time", 
      "end", 
      "area", 
      "host", 
      "dollars", 
      "devastating effects", 
      "society", 
      "economy", 
      "government", 
      "mechanism", 
      "worms", 
      "minutes", 
      "matter", 
      "damage", 
      "effect"
    ], 
    "name": "Sting: An End-to-End Self-Healing System for Defending against Internet Worms", 
    "pagination": "147-170", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1042639608"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-0-387-44599-1_7"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-0-387-44599-1_7", 
      "https://app.dimensions.ai/details/publication/pub.1042639608"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-05-20T07:47", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220519/entities/gbq_results/chapter/chapter_403.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-0-387-44599-1_7"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-44599-1_7'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-44599-1_7'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-44599-1_7'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-44599-1_7'


 

This table displays all metadata directly associated to this object as RDF triples.

133 TRIPLES      23 PREDICATES      64 URIs      57 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-0-387-44599-1_7 schema:about anzsrc-for:08
2 anzsrc-for:0803
3 schema:author N4a47ba5077b543549d477fe35b30021c
4 schema:datePublished 2007-01-01
5 schema:datePublishedReg 2007-01-01
6 schema:description We increasingly rely on highly available systems in all areas of society, from the economy, to military, to the government. Unfortunately, much software, including critical applications, contains vulnerabilities unknown at the time of deployment, with memory-overwrite vulnerabilities (such as buffer overflow and format string vulnerabilities) accounting for more than 60% of total vulnerabilities [10]. These vulnerabilities, when exploited, can cause devastating effects, such as self-propagating worm attacks which can compromise millions of vulnerable hosts within a matter of minutes or even seconds [32],[61], and cause millions of dollars of damage [30]. Therefore, we need to develop effective mechanisms to protect vulnerable hosts from being compromised and allow them to continue providing critical services, even under aggressively spreading attacks on previously unknown vulnerabilities.
7 schema:editor Nbdac6913af7146989454eafeb4ba3742
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree true
11 schema:isPartOf N95a75951246b48908bb1db3ba1d31f22
12 schema:keywords Internet worms
13 applications
14 area
15 areas of society
16 attacks
17 available systems
18 critical applications
19 critical services
20 damage
21 deployment
22 devastating effects
23 dollars
24 economy
25 effect
26 effective mechanism
27 end
28 government
29 host
30 matter
31 matter of minutes
32 mechanism
33 military
34 millions
35 millions of dollars
36 minutes
37 seconds
38 self-healing system
39 services
40 society
41 software
42 system
43 time
44 time of deployment
45 total vulnerability
46 unknown vulnerabilities
47 vulnerability
48 vulnerable hosts
49 worm attacks
50 worms
51 schema:name Sting: An End-to-End Self-Healing System for Defending against Internet Worms
52 schema:pagination 147-170
53 schema:productId N5a2c9cf0acb74ae5aa167d78db43a7de
54 N78373f93ec514faea3312e9e9b27e445
55 schema:publisher Na2f84d3f0f7e4138af9fe9d40039736f
56 schema:sameAs https://app.dimensions.ai/details/publication/pub.1042639608
57 https://doi.org/10.1007/978-0-387-44599-1_7
58 schema:sdDatePublished 2022-05-20T07:47
59 schema:sdLicense https://scigraph.springernature.com/explorer/license/
60 schema:sdPublisher N6446cf59e8614261a493e3da6b4b8657
61 schema:url https://doi.org/10.1007/978-0-387-44599-1_7
62 sgo:license sg:explorer/license/
63 sgo:sdDataset chapters
64 rdf:type schema:Chapter
65 N12500407483048e48c7790459319ae06 schema:familyName Song
66 schema:givenName Dawn
67 rdf:type schema:Person
68 N148025aa2623490ba4dc4ca5a1ce0e4c rdf:first N12500407483048e48c7790459319ae06
69 rdf:rest Nb143eef65eff415fb6b7352a88209091
70 N1daf34e531684da49e887542af71c1cd schema:familyName Jha
71 schema:givenName Somesh
72 rdf:type schema:Person
73 N2420064691994ced9f0922219ba66fc0 schema:familyName Wang
74 schema:givenName Cliff
75 rdf:type schema:Person
76 N3a13c561c44f4c12b5e8ccf4d3bf647f rdf:first sg:person.010737772415.24
77 rdf:rest N3ed29c26a90d4779a698df8860f229c5
78 N3ed29c26a90d4779a698df8860f229c5 rdf:first sg:person.01143152610.86
79 rdf:rest rdf:nil
80 N423a0b6d7a90445b87f79f0be2f80b0d schema:familyName Christodorescu
81 schema:givenName Mihai
82 rdf:type schema:Person
83 N4a47ba5077b543549d477fe35b30021c rdf:first sg:person.07667617727.70
84 rdf:rest N3a13c561c44f4c12b5e8ccf4d3bf647f
85 N5a2c9cf0acb74ae5aa167d78db43a7de schema:name doi
86 schema:value 10.1007/978-0-387-44599-1_7
87 rdf:type schema:PropertyValue
88 N6446cf59e8614261a493e3da6b4b8657 schema:name Springer Nature - SN SciGraph project
89 rdf:type schema:Organization
90 N78373f93ec514faea3312e9e9b27e445 schema:name dimensions_id
91 schema:value pub.1042639608
92 rdf:type schema:PropertyValue
93 N8c9dc2e107c943a6b105c15af1ab61d2 schema:familyName Maughan
94 schema:givenName Douglas
95 rdf:type schema:Person
96 N95a75951246b48908bb1db3ba1d31f22 schema:isbn 978-0-387-32720-4
97 978-0-387-44599-1
98 schema:name Malware Detection
99 rdf:type schema:Book
100 Na2f84d3f0f7e4138af9fe9d40039736f schema:name Springer Nature
101 rdf:type schema:Organisation
102 Nb143eef65eff415fb6b7352a88209091 rdf:first N2420064691994ced9f0922219ba66fc0
103 rdf:rest rdf:nil
104 Nb5591ccc52cf43beb7b0d6baaeb14ec7 rdf:first N1daf34e531684da49e887542af71c1cd
105 rdf:rest Nd9ddf816a0e0431696141f02ce832c37
106 Nbdac6913af7146989454eafeb4ba3742 rdf:first N423a0b6d7a90445b87f79f0be2f80b0d
107 rdf:rest Nb5591ccc52cf43beb7b0d6baaeb14ec7
108 Nd9ddf816a0e0431696141f02ce832c37 rdf:first N8c9dc2e107c943a6b105c15af1ab61d2
109 rdf:rest N148025aa2623490ba4dc4ca5a1ce0e4c
110 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
111 schema:name Information and Computing Sciences
112 rdf:type schema:DefinedTerm
113 anzsrc-for:0803 schema:inDefinedTermSet anzsrc-for:
114 schema:name Computer Software
115 rdf:type schema:DefinedTerm
116 sg:person.010737772415.24 schema:affiliation grid-institutes:grid.147455.6
117 schema:familyName Newsome
118 schema:givenName James
119 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010737772415.24
120 rdf:type schema:Person
121 sg:person.01143152610.86 schema:affiliation grid-institutes:grid.147455.6
122 schema:familyName Song
123 schema:givenName Dawn
124 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01143152610.86
125 rdf:type schema:Person
126 sg:person.07667617727.70 schema:affiliation grid-institutes:grid.147455.6
127 schema:familyName Brumley
128 schema:givenName David
129 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07667617727.70
130 rdf:type schema:Person
131 grid-institutes:grid.147455.6 schema:alternateName Carnegie Mellon University, Pittsburgh, PA, USA
132 schema:name Carnegie Mellon University, Pittsburgh, PA, USA
133 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...