메뉴 건너뛰기




Volumn E92-D, Issue 5, 2009, Pages 787-798

Practical correlation analysis between scan and malware profiles against zero-day attacks based on darknet monitoring

Author keywords

Correlation analysis; Darknet malware analysis; Network monitoring; Sandbox

Indexed keywords

COMPUTER CRIME; CORRELATION METHODS;

EID: 76249083391     PISSN: 09168532     EISSN: 17451361     Source Type: Journal    
DOI: 10.1587/transinf.E92.D.787     Document Type: Article
Times cited : (37)

References (29)
  • 4
    • 85027150157 scopus 로고    scopus 로고
    • SANS Internet Storm Center
    • SANS Internet Storm Center, http://isc.sans.org/
  • 5
    • 85027117710 scopus 로고    scopus 로고
    • REN-ISAC: Research and Education Networking Information Sharing and Analysis Center
    • REN-ISAC: Research and Education Networking Information Sharing and Analysis Center, http://www.ren-isac.net/
  • 6
    • 85027144242 scopus 로고    scopus 로고
    • Leurrecom.org Honeypot project
    • Leurrecom.org Honeypot project, http://www.leurrecom.org/
  • 7
    • 85027164027 scopus 로고    scopus 로고
    • National Cyber Security Center, Korea
    • National Cyber Security Center, Korea, http://www.ncsc.go.kr/eng/
  • 8
    • 85027152699 scopus 로고    scopus 로고
    • Telecom Information Sharing and Analysis Center, Japan
    • Telecom Information Sharing and Analysis Center, Japan, https://www.telecom-isac.jp/
  • 9
    • 85027136112 scopus 로고    scopus 로고
    • IT Security Center, Information-Technology Promotion Agency, Japan
    • IT Security Center, Information-Technology Promotion Agency, Japan, https://www.ipa.go.jp/security/index-e.html
  • 10
    • 85027126561 scopus 로고    scopus 로고
    • Japan Computer Emergency Response Team Coordination Center
    • Japan Computer Emergency Response Team Coordination Center, http://jpcert.jp/isdas/index-en. html
  • 11
    • 85027181230 scopus 로고    scopus 로고
    • police
    • police, http://www.cyberpolice.go.jp/english/obs e.html
  • 13
  • 17
    • 79958749992 scopus 로고    scopus 로고
    • A virus analysis supporting system; for automatic grasping virus behavior by code-analysis result
    • CSS2005
    • R. Isawa, S. Ichikawa, Y. Shiraishi, M. Mohri, and M. Morii, "A virus analysis supporting system; for automatic grasping virus behavior by code-analysis result, " Computer Security Symposium 2005 (CSS2005), vol. 1, pp. 169-174, 2006.
    • (2005) Computer Security Symposium , vol.1 , pp. 169-174
    • Isawa, R.1    Ichikawa, S.2    Shiraishi, Y.3    Mohri, M.4    Morii, M.5
  • 19
    • 77950324846 scopus 로고    scopus 로고
    • A proposal of automated malware behavior analysis system, Information and Communication System Security
    • ICSS2006-07
    • Y. Hoshizawa, M. Morii, and K. Nakao, "A proposal of automated malware behavior analysis system, Information and Communication System Security, " IEICE Technical Report, ICSS2006-07, 2006.
    • (2006) IEICE Technical Report
    • Hoshizawa, Y.1    Morii, M.2    Nakao, K.3
  • 20
    • 34047110218 scopus 로고    scopus 로고
    • Toward automated dynamic malware analysis using CWSandbox
    • C. Willems, T. Holz, and F. Freiling, "Toward automated dynamic malware analysis using CWSandbox, " IEEE Security & Privacy Magazine, vol. 5, no. 2, pp. 32-39, 2007.
    • (2007) IEEE Security & Privacy Magazine , vol.5 , Issue.2 , pp. 32-39
    • Willems, C.1    Holz, T.2    Freiling, F.3
  • 21
    • 85027115551 scopus 로고    scopus 로고
    • NORMAN Sandbox Information Center
    • NORMAN Sandbox Information Center, http://www.norman. com/microsites/nsic/
  • 25
    • 51249111229 scopus 로고    scopus 로고
    • A novel concept of network incident analysis based on multi-layer observations of malware activities
    • K. Nakao, K. Yoshioka, D. Inoue, and M. Eto, "A novel concept of network incident analysis based on multi-layer observations of malware activities, " 2nd Joint Workshop on Information Security (JWIS07), pp. 267-279, 2007.
    • (2007) 2nd Joint Workshop on Information Security (JWIS07) , pp. 267-279
    • Nakao, K.1    Yoshioka, K.2    Inoue, D.3    Eto, M.4
  • 27
    • 77950319526 scopus 로고    scopus 로고
    • Analyzing traffic directed to unused IP address blocks
    • IA2005-23, Jan
    • K. Suzuki, S. Baba, and H. Takakura, "Analyzing traffic directed to unused IP address blocks, " IEICE Technical Report, IA2005-23, Jan. 2006.
    • (2006) IEICE Technical Report
    • Suzuki, K.1    Baba, S.2    Takakura, H.3
  • 28
    • 33644653840 scopus 로고    scopus 로고
    • A unifying framework for detecting outliers and change points from non-stationary time series data
    • J. Takeuchi and K. Yamanishi, "A unifying framework for detecting outliers and change points from non-stationary time series data, " IEEE Trans. Knowledge Data Eng., vol. 18, no. 4, pp. 482-489, 2006.
    • (2006) IEEE Trans. Knowledge Data Eng. , vol.18 , Issue.4 , pp. 482-489
    • Takeuchi, J.1    Yamanishi, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.