Ontology type: schema:Chapter Open Access: True
2007-01-01
AUTHORSDavid Brumley , James Newsome , Dawn Song
ABSTRACTWe increasingly rely on highly available systems in all areas of society, from the economy, to military, to the government. Unfortunately, much software, including critical applications, contains vulnerabilities unknown at the time of deployment, with memory-overwrite vulnerabilities (such as buffer overflow and format string vulnerabilities) accounting for more than 60% of total vulnerabilities [10]. These vulnerabilities, when exploited, can cause devastating effects, such as self-propagating worm attacks which can compromise millions of vulnerable hosts within a matter of minutes or even seconds [32],[61], and cause millions of dollars of damage [30]. Therefore, we need to develop effective mechanisms to protect vulnerable hosts from being compromised and allow them to continue providing critical services, even under aggressively spreading attacks on previously unknown vulnerabilities. More... »
PAGES147-170
Malware Detection
ISBN
978-0-387-32720-4
978-0-387-44599-1
http://scigraph.springernature.com/pub.10.1007/978-0-387-44599-1_7
DOIhttp://dx.doi.org/10.1007/978-0-387-44599-1_7
DIMENSIONShttps://app.dimensions.ai/details/publication/pub.1042639608
JSON-LD is the canonical representation for SciGraph data.
TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT
[
{
"@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json",
"about": [
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Information and Computing Sciences",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0803",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Computer Software",
"type": "DefinedTerm"
}
],
"author": [
{
"affiliation": {
"alternateName": "Carnegie Mellon University, Pittsburgh, PA, USA",
"id": "http://www.grid.ac/institutes/grid.147455.6",
"name": [
"Carnegie Mellon University, Pittsburgh, PA, USA"
],
"type": "Organization"
},
"familyName": "Brumley",
"givenName": "David",
"id": "sg:person.07667617727.70",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07667617727.70"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Carnegie Mellon University, Pittsburgh, PA, USA",
"id": "http://www.grid.ac/institutes/grid.147455.6",
"name": [
"Carnegie Mellon University, Pittsburgh, PA, USA"
],
"type": "Organization"
},
"familyName": "Newsome",
"givenName": "James",
"id": "sg:person.010737772415.24",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010737772415.24"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Carnegie Mellon University, Pittsburgh, PA, USA",
"id": "http://www.grid.ac/institutes/grid.147455.6",
"name": [
"Carnegie Mellon University, Pittsburgh, PA, USA"
],
"type": "Organization"
},
"familyName": "Song",
"givenName": "Dawn",
"id": "sg:person.01143152610.86",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01143152610.86"
],
"type": "Person"
}
],
"datePublished": "2007-01-01",
"datePublishedReg": "2007-01-01",
"description": "We increasingly rely on highly available systems in all areas of society, from the economy, to military, to the government. Unfortunately, much software, including critical applications, contains vulnerabilities unknown at the time of deployment, with memory-overwrite vulnerabilities (such as buffer overflow and format string vulnerabilities) accounting for more than 60% of total vulnerabilities [10]. These vulnerabilities, when exploited, can cause devastating effects, such as self-propagating worm attacks which can compromise millions of vulnerable hosts within a matter of minutes or even seconds [32],[61], and cause millions of dollars of damage [30]. Therefore, we need to develop effective mechanisms to protect vulnerable hosts from being compromised and allow them to continue providing critical services, even under aggressively spreading attacks on previously unknown vulnerabilities.",
"editor": [
{
"familyName": "Christodorescu",
"givenName": "Mihai",
"type": "Person"
},
{
"familyName": "Jha",
"givenName": "Somesh",
"type": "Person"
},
{
"familyName": "Maughan",
"givenName": "Douglas",
"type": "Person"
},
{
"familyName": "Song",
"givenName": "Dawn",
"type": "Person"
},
{
"familyName": "Wang",
"givenName": "Cliff",
"type": "Person"
}
],
"genre": "chapter",
"id": "sg:pub.10.1007/978-0-387-44599-1_7",
"inLanguage": "en",
"isAccessibleForFree": true,
"isPartOf": {
"isbn": [
"978-0-387-32720-4",
"978-0-387-44599-1"
],
"name": "Malware Detection",
"type": "Book"
},
"keywords": [
"vulnerable hosts",
"worm attacks",
"unknown vulnerabilities",
"time of deployment",
"self-healing system",
"Internet worms",
"critical applications",
"critical services",
"matter of minutes",
"areas of society",
"available systems",
"millions of dollars",
"attacks",
"effective mechanism",
"vulnerability",
"software",
"deployment",
"millions",
"system",
"services",
"total vulnerability",
"applications",
"military",
"seconds",
"time",
"end",
"area",
"host",
"dollars",
"devastating effects",
"society",
"economy",
"government",
"mechanism",
"worms",
"minutes",
"matter",
"damage",
"effect"
],
"name": "Sting: An End-to-End Self-Healing System for Defending against Internet Worms",
"pagination": "147-170",
"productId": [
{
"name": "dimensions_id",
"type": "PropertyValue",
"value": [
"pub.1042639608"
]
},
{
"name": "doi",
"type": "PropertyValue",
"value": [
"10.1007/978-0-387-44599-1_7"
]
}
],
"publisher": {
"name": "Springer Nature",
"type": "Organisation"
},
"sameAs": [
"https://doi.org/10.1007/978-0-387-44599-1_7",
"https://app.dimensions.ai/details/publication/pub.1042639608"
],
"sdDataset": "chapters",
"sdDatePublished": "2022-05-20T07:47",
"sdLicense": "https://scigraph.springernature.com/explorer/license/",
"sdPublisher": {
"name": "Springer Nature - SN SciGraph project",
"type": "Organization"
},
"sdSource": "s3://com-springernature-scigraph/baseset/20220519/entities/gbq_results/chapter/chapter_403.jsonl",
"type": "Chapter",
"url": "https://doi.org/10.1007/978-0-387-44599-1_7"
}
]
Download the RDF metadata as: json-ld nt turtle xml License info
JSON-LD is a popular format for linked data which is fully compatible with JSON.
curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-44599-1_7'
N-Triples is a line-based linked data format ideal for batch operations.
curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-44599-1_7'
Turtle is a human-readable linked data format.
curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-44599-1_7'
RDF/XML is a standard XML format for linked data.
curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-44599-1_7'
This table displays all metadata directly associated to this object as RDF triples.
133 TRIPLES
23 PREDICATES
64 URIs
57 LITERALS
7 BLANK NODES