메뉴 건너뛰기




Volumn 5, Issue SUPPL., 2008, Pages

A framework for attack patterns' discovery in honeynet data

Author keywords

Attack patterns; Honeypot forensics; Knowledge discovery; Security data mining; Traffic analysis

Indexed keywords

DATA MINING; TIME SERIES ANALYSIS;

EID: 48749129421     PISSN: 17422876     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.diin.2008.05.012     Document Type: Article
Times cited : (56)

References (30)
  • 1
    • 48749108827 scopus 로고    scopus 로고
    • Baecher P, Koetter M, Holz T, Dornseif M, Freiling F. The nepenthes platform: an efficient approach to collect malware. In: Proceedings of the 9th international symposium on recent advances in intrusion detection (RAID); September 2006.
    • Baecher P, Koetter M, Holz T, Dornseif M, Freiling F. The nepenthes platform: an efficient approach to collect malware. In: Proceedings of the 9th international symposium on recent advances in intrusion detection (RAID); September 2006.
  • 3
    • 84990895509 scopus 로고    scopus 로고
    • Chen B, Yegneswaran V, Barford P, Ramakrishnan R. Toward a query language for network attack data. In: Second IEEE workshop on networks meets databases (NetDB '06); April 2006.
    • Chen B, Yegneswaran V, Barford P, Ramakrishnan R. Toward a query language for network attack data. In: Second IEEE workshop on networks meets databases (NetDB '06); April 2006.
  • 4
    • 48749085252 scopus 로고    scopus 로고
    • Chen Z, Gao L, Kwiat K. Modeling the spread of active worms; 2003.
    • Chen Z, Gao L, Kwiat K. Modeling the spread of active worms; 2003.
  • 6
    • 48749092162 scopus 로고    scopus 로고
    • Dagon D, Zou C, Lee W. Modeling botnet propagation using time zones. In: Proceedings of the 13th annual network and distributed system security symposium (NDSS'06); February 2006.
    • Dagon D, Zou C, Lee W. Modeling botnet propagation using time zones. In: Proceedings of the 13th annual network and distributed system security symposium (NDSS'06); February 2006.
  • 8
    • 48749084721 scopus 로고    scopus 로고
    • DShield. Available from: .
    • DShield. Available from: .
  • 9
    • 48749093505 scopus 로고    scopus 로고
    • Internet motion sensor. Available from: .
    • Internet motion sensor. Available from: .
  • 10
    • 0014856267 scopus 로고
    • An analysis of some graph theoretical cluster techniques
    • Gary Augustson J., and Minker J. An analysis of some graph theoretical cluster techniques. Journal of the ACM 17 4 (1970) 571-588
    • (1970) Journal of the ACM , vol.17 , Issue.4 , pp. 571-588
    • Gary Augustson, J.1    Minker, J.2
  • 11
    • 48749091387 scopus 로고    scopus 로고
    • Jain AK, Dubes RC. Algorithms for clustering data. Prentice-Hall advanced reference series; 1988.
    • Jain AK, Dubes RC. Algorithms for clustering data. Prentice-Hall advanced reference series; 1988.
  • 14
    • 33947150487 scopus 로고    scopus 로고
    • Li X, Bian F, Zhang H, Diot C, Govindan R, Hong W, et al. Advanced indexing techniques for wide-area network monitoring. In: First IEEE international workshop on networking meets databases (NetDB); 2005.
    • Li X, Bian F, Zhang H, Diot C, Govindan R, Hong W, et al. Advanced indexing techniques for wide-area network monitoring. In: First IEEE international workshop on networking meets databases (NetDB); 2005.
  • 15
    • 33745781710 scopus 로고    scopus 로고
    • Lin J, Keogh E, Lonardi S, Chiu B. A symbolic representation of time series, with implications for streaming algorithms. In: Proceedings of the eighth ACM SIGMOD workshop on research issues in data mining and knowledge discovery, California, USA; 2003.
    • Lin J, Keogh E, Lonardi S, Chiu B. A symbolic representation of time series, with implications for streaming algorithms. In: Proceedings of the eighth ACM SIGMOD workshop on research issues in data mining and knowledge discovery, California, USA; 2003.
  • 16
    • 26444582427 scopus 로고    scopus 로고
    • McHugh J. Sets, bags, and rock and roll: analyzing large data sets of network data. In: ESORICS; 2004. p. 407-22.
    • McHugh J. Sets, bags, and rock and roll: analyzing large data sets of network data. In: ESORICS; 2004. p. 407-22.
  • 17
    • 48749121607 scopus 로고    scopus 로고
    • Moore D, Shannon C, Voelker GM, Savage S. Network telescopes: technical report. CAIDA; April 2004.
    • Moore D, Shannon C, Voelker GM, Savage S. Network telescopes: technical report. CAIDA; April 2004.
  • 19
    • 0041939837 scopus 로고    scopus 로고
    • Pavan M, Pelillo M. A new graph-theoretic approach to clustering and segmentation. In: Proceedings of the IEEE conference on computer vision and pattern recognition; 2003.
    • Pavan M, Pelillo M. A new graph-theoretic approach to clustering and segmentation. In: Proceedings of the IEEE conference on computer vision and pattern recognition; 2003.
  • 20
    • 85084163190 scopus 로고    scopus 로고
    • Provos N. A virtual honeypot framework. In: Proceedings of the 13th USENIX security symposium; 2004.
    • Provos N. A virtual honeypot framework. In: Proceedings of the 13th USENIX security symposium; 2004.
  • 21
    • 48749095072 scopus 로고    scopus 로고
    • Pouget F, Dacier M. Honeypot-based forensics. In: AusCERT2004, Brisbane, Australia; 23rd-27th May 2004.
    • Pouget F, Dacier M. Honeypot-based forensics. In: AusCERT2004, Brisbane, Australia; 23rd-27th May 2004.
  • 23
    • 48749110463 scopus 로고    scopus 로고
    • Pouget F, Urvoy Keller G, Dacier M. Time signatures to detect multi-headed stealthy attack tools. In: 18th annual FIRST conference, June 25-30, 2006, Baltimore, USA; June 2006b.
    • Pouget F, Urvoy Keller G, Dacier M. Time signatures to detect multi-headed stealthy attack tools. In: 18th annual FIRST conference, June 25-30, 2006, Baltimore, USA; June 2006b.
  • 24
    • 48749107025 scopus 로고    scopus 로고
    • Riordan J, Zamboni D, Duponchel Y. Building and deploying billy goat, a worm-detection system. In: Proceedings of the 18th annual FIRST conference; 2006.
    • Riordan J, Zamboni D, Duponchel Y. Building and deploying billy goat, a worm-detection system. In: Proceedings of the 18th annual FIRST conference; 2006.
  • 25
    • 48749104640 scopus 로고    scopus 로고
    • Sophos threat analysis. W32/allaple-b. Available from: .
    • Sophos threat analysis. W32/allaple-b. Available from: .
  • 26
    • 48749086888 scopus 로고    scopus 로고
    • Team Cymru. Darknet project. Available from: .
    • Team Cymru. Darknet project. Available from: .
  • 27
    • 48749105686 scopus 로고    scopus 로고
    • The Leurre.com project. Available from: .
    • The Leurre.com project. Available from: .
  • 28
    • 48749103906 scopus 로고    scopus 로고
    • Werner T. Honeytrap. Available from: .
    • Werner T. Honeytrap. Available from: .
  • 29
    • 38049095637 scopus 로고    scopus 로고
    • Xinshun X, Jun M, Jingsheng L. An improved ant colony optimization for the maximum clique problem. In: Third international conference on natural computation (ICNC 2007), vol. IV; 2007. p. 766-70.
    • Xinshun X, Jun M, Jingsheng L. An improved ant colony optimization for the maximum clique problem. In: Third international conference on natural computation (ICNC 2007), vol. IV; 2007. p. 766-70.
  • 30
    • 48749104843 scopus 로고    scopus 로고
    • Yegneswaran V, Barford P, Paxson V. Using honeynets for internet situational awareness. In: Fourth ACM SIGCOMM workshop on hot topics in networking (Hotnets IV); 2005.
    • Yegneswaran V, Barford P, Paxson V. Using honeynets for internet situational awareness. In: Fourth ACM SIGCOMM workshop on hot topics in networking (Hotnets IV); 2005.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.