-
1
-
-
85081770459
-
The internet motion sensor: A distributed blackhole monitoring system
-
M. Bailey, E. Cooke, F. Jahanian, J. Nazario, and D. Watson, "The internet motion sensor: A distributed blackhole monitoring system, " 12th Annual Network and Distributed System Security Symposium (NDSS05), 2005.
-
(2005)
12th Annual Network and Distributed System Security Symposium (NDSS05)
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Nazario, J.4
Watson, D.5
-
3
-
-
35048867316
-
On the design and use of Internet sinks for network abuse monitoring
-
LNCS 3224
-
V. Yegneswaran, P. Barford, and D. Plonka, "On the design and use of Internet sinks for network abuse monitoring, " 7th International Symposium on Recent Advances in Intrusion Detection (RAID 2004), LNCS 3224, pp. 146-165, 2004.
-
(2004)
7th International Symposium on Recent Advances in Intrusion Detection RAID 2004
, pp. 146-165
-
-
Yegneswaran, V.1
Barford, P.2
Plonka, D.3
-
4
-
-
85027150157
-
-
SANS Internet Storm Center
-
SANS Internet Storm Center, http://isc.sans.org/
-
-
-
-
5
-
-
85027117710
-
-
REN-ISAC: Research and Education Networking Information Sharing and Analysis Center
-
REN-ISAC: Research and Education Networking Information Sharing and Analysis Center, http://www.ren-isac.net/
-
-
-
-
6
-
-
85027144242
-
-
Leurrecom.org Honeypot project
-
Leurrecom.org Honeypot project, http://www.leurrecom.org/
-
-
-
-
7
-
-
85027164027
-
-
National Cyber Security Center, Korea
-
National Cyber Security Center, Korea, http://www.ncsc.go.kr/eng/
-
-
-
-
8
-
-
85027152699
-
-
Telecom Information Sharing and Analysis Center, Japan
-
Telecom Information Sharing and Analysis Center, Japan, https://www.telecom-isac.jp/
-
-
-
-
9
-
-
85027136112
-
-
IT Security Center, Information-Technology Promotion Agency, Japan
-
IT Security Center, Information-Technology Promotion Agency, Japan, https://www.ipa.go.jp/security/index-e.html
-
-
-
-
10
-
-
85027126561
-
-
Japan Computer Emergency Response Team Coordination Center
-
Japan Computer Emergency Response Team Coordination Center, http://jpcert.jp/isdas/index-en. html
-
-
-
-
11
-
-
85027181230
-
-
police
-
police, http://www.cyberpolice.go.jp/english/obs e.html
-
-
-
-
12
-
-
44049086375
-
Practical darknet measurement
-
M. Bailey, E. Cooke, F. Jahanian, A. Myrick, and S. Sinha, "Practical darknet measurement, " 2006 Conference on Information Sciences and Systems (CISS '06), pp. 1496-1501, 2006.
-
(2006)
2006 Conference on Information Sciences and Systems (CISS '06)
, pp. 1496-1501
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Myrick, A.4
Sinha, S.5
-
13
-
-
14944377862
-
Honeyd: A virtual honeypot daemon
-
N. Provos, "Honeyd: A virtual honeypot daemon, " 10th DFN-CERT Workshop, 2003.
-
(2003)
10th DFN-CERT Workshop
-
-
Provos, N.1
-
15
-
-
34547491379
-
Lessons learned from the deployment of a high-interaction honeypot
-
E. Alata, V. Nicomette, M. Kaaniche, and M. Dacier, "Lessons learned from the deployment of a high-interaction honeypot, " 6th European Dependable Computing Conference (EDCC-6), pp. 39-44, 2006.
-
(2006)
6th European Dependable Computing Conference (EDCC-6)
, pp. 39-44
-
-
Alata, E.1
Nicomette, V.2
Kaaniche, M.3
Dacier, M.4
-
16
-
-
33750320499
-
Automatic handling of protocol dependencies and reaction to 0-day attacks with ScriptGen based honeypots
-
C. Leita, M. Dacier, and F. Massicotte, "Automatic handling of protocol dependencies and reaction to 0-day attacks with ScriptGen based honeypots, " 9th International Symposium on Recent Advances in Intrusion Detection (RAID2006), pp. 185-205, 2006.
-
(2006)
9th International Symposium on Recent Advances in Intrusion Detection (RAID2006)
, pp. 185-205
-
-
Leita, C.1
Dacier, M.2
Massicotte, F.3
-
17
-
-
79958749992
-
A virus analysis supporting system; for automatic grasping virus behavior by code-analysis result
-
CSS2005
-
R. Isawa, S. Ichikawa, Y. Shiraishi, M. Mohri, and M. Morii, "A virus analysis supporting system; for automatic grasping virus behavior by code-analysis result, " Computer Security Symposium 2005 (CSS2005), vol. 1, pp. 169-174, 2006.
-
(2005)
Computer Security Symposium
, vol.1
, pp. 169-174
-
-
Isawa, R.1
Ichikawa, S.2
Shiraishi, Y.3
Mohri, M.4
Morii, M.5
-
18
-
-
77950317603
-
Micro analysis system for analyzing malware code and its behavior on nicter
-
2F2-1
-
D. Inoue, M. Eto, K. Yoshioka, Y. Hoshizawa, R. Isawa, M. Morii, and K. Nakao, "Micro analysis system for analyzing malware code and its behavior on nicter, " 2007 Symposium on Cryptography and Information Security (SCIS2007), 2F2-1, 2007.
-
(2007)
2007 Symposium on Cryptography and Information Security (SCIS2007)
-
-
Inoue, D.1
Eto, M.2
Yoshioka, K.3
Hoshizawa, Y.4
Isawa, R.5
Morii, M.6
Nakao, K.7
-
19
-
-
77950324846
-
A proposal of automated malware behavior analysis system, Information and Communication System Security
-
ICSS2006-07
-
Y. Hoshizawa, M. Morii, and K. Nakao, "A proposal of automated malware behavior analysis system, Information and Communication System Security, " IEICE Technical Report, ICSS2006-07, 2006.
-
(2006)
IEICE Technical Report
-
-
Hoshizawa, Y.1
Morii, M.2
Nakao, K.3
-
20
-
-
34047110218
-
Toward automated dynamic malware analysis using CWSandbox
-
C. Willems, T. Holz, and F. Freiling, "Toward automated dynamic malware analysis using CWSandbox, " IEEE Security & Privacy Magazine, vol. 5, no. 2, pp. 32-39, 2007.
-
(2007)
IEEE Security & Privacy Magazine
, vol.5
, Issue.2
, pp. 32-39
-
-
Willems, C.1
Holz, T.2
Freiling, F.3
-
21
-
-
85027115551
-
-
NORMAN Sandbox Information Center
-
NORMAN Sandbox Information Center, http://www.norman. com/microsites/nsic/
-
-
-
-
22
-
-
84859032561
-
Visualization technologies of nicter incident analysis system
-
ISEC-176
-
K. Nakao, F. Matsumoto, D. Inoue, S. Baba, K. Suzuki, M. Eto, K. Yoshioka, K. Rikitake, and Y. Hori, "Visualization technologies of nicter incident analysis system, " IEICE Technical Report, ISEC-176, 2006.
-
(2006)
IEICE Technical Report
-
-
Nakao, K.1
Matsumoto, F.2
Inoue, D.3
Baba, S.4
Suzuki, K.5
Eto, M.6
Yoshioka, K.7
Rikitake, K.8
Hori, Y.9
-
23
-
-
51249112473
-
Nicter: An incident analysis system using correlation between network monitoring and malware analysis
-
K. Nakao, K. Yoshioka, D. Inoue, M. Eto, and K. Rikitake, "nicter: An incident analysis system using correlation between network monitoring and malware analysis, " 1st Joint Workshop on Information Security (JWIS06), pp. 363-377, 2006.
-
(2006)
1st Joint Workshop on Information Security (JWIS06)
, pp. 363-377
-
-
Nakao, K.1
Yoshioka, K.2
Inoue, D.3
Eto, M.4
Rikitake, K.5
-
24
-
-
77950322108
-
Macro-micro correlation analysis for binding darknet traffic and malwares
-
2F2-2 2007
-
K. Yoshioka, M. Eto, D. Inoue, and K. Nakao, "Macro-micro correlation analysis for binding darknet traffic and malwares, " 2007 Symposium on Cryptography and Information Security (SCIS2007), 2F2-2, 2007.
-
(2007)
Symposium on Cryptography and Information Security SCIS2007
-
-
Yoshioka, K.1
Eto, M.2
Inoue, D.3
Nakao, K.4
-
25
-
-
51249111229
-
A novel concept of network incident analysis based on multi-layer observations of malware activities
-
K. Nakao, K. Yoshioka, D. Inoue, and M. Eto, "A novel concept of network incident analysis based on multi-layer observations of malware activities, " 2nd Joint Workshop on Information Security (JWIS07), pp. 267-279, 2007.
-
(2007)
2nd Joint Workshop on Information Security (JWIS07)
, pp. 267-279
-
-
Nakao, K.1
Yoshioka, K.2
Inoue, D.3
Eto, M.4
-
26
-
-
55149085740
-
Nicter: An incident analysis system toward binding network monitoring with malware analysis
-
D. Inoue, M. Eto, K. Yoshioka, S. Baba, K. Suzuki, J. Nakazato, K. Ohtaka, and K. Nakao, "nicter: An incident analysis system toward binding network monitoring with malware analysis, " WOMBAT Workshop on Information Security Threats Data Collection and Sharing (WISTDCS 2008), pp. 58-66, 2008.
-
(2008)
WOMBAT Workshop on Information Security Threats Data Collection and Sharing (WISTDCS 2008)
, pp. 58-66
-
-
Inoue, D.1
Eto, M.2
Yoshioka, K.3
Baba, S.4
Suzuki, K.5
Nakazato, J.6
Ohtaka, K.7
Nakao, K.8
-
27
-
-
77950319526
-
Analyzing traffic directed to unused IP address blocks
-
IA2005-23, Jan
-
K. Suzuki, S. Baba, and H. Takakura, "Analyzing traffic directed to unused IP address blocks, " IEICE Technical Report, IA2005-23, Jan. 2006.
-
(2006)
IEICE Technical Report
-
-
Suzuki, K.1
Baba, S.2
Takakura, H.3
-
28
-
-
33644653840
-
A unifying framework for detecting outliers and change points from non-stationary time series data
-
J. Takeuchi and K. Yamanishi, "A unifying framework for detecting outliers and change points from non-stationary time series data, " IEEE Trans. Knowledge Data Eng., vol. 18, no. 4, pp. 482-489, 2006.
-
(2006)
IEEE Trans. Knowledge Data Eng.
, vol.18
, Issue.4
, pp. 482-489
-
-
Takeuchi, J.1
Yamanishi, K.2
-
29
-
-
33750376598
-
The nepenthes platform: An efficient approach to collect malware
-
RAID 2006
-
P. Baecher, M. Koetter, T. Holz, M. Dornseif, and F. C. Freiling, "The nepenthes platform: an efficient approach to collect malware, " 9th International Symposium on Recent Advances in Intrusion Detection, (RAID 2006), pp. 165-184, 2006.
-
(2006)
9th International Symposium on Recent Advances in Intrusion Detection
, pp. 165-184
-
-
Baecher, P.1
Koetter, M.2
Holz, T.3
Dornseif, M.4
Freiling, F.C.5
|