메뉴 건너뛰기




Volumn 6027 LNCS, Issue , 2010, Pages 151-164

Towards early warning systems - Challenges, technologies and architecture

Author keywords

automated process chain; clustering; confidentiality; early warning; intrusion detection; signature learning

Indexed keywords

ANALYSIS SYSTEM; AUTOMATED PROCESS; CLUSTERING; COGNITIVE ABILITY; DEPLOYMENT SCENARIOS; DETECTION SYSTEM; EARLY WARNING; EARLY WARNING SYSTEM; EARLY WARNING SYSTEMS; INFORMATION AND COMMUNICATION TECHNOLOGIES; INTEGRATED PROCESS CHAIN; MALWARES; SECURITY INCIDENT; SECURITY THREATS; SIGNATURE GENERATION; TECHNICAL DETAILS;

EID: 77955040319     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-14379-3_13     Document Type: Conference Paper
Times cited : (10)

References (32)
  • 1
    • 77955043847 scopus 로고    scopus 로고
    • Carmentis: A co-operative approach towards situation awareness and early warning for the internet
    • GI
    • Grobauer, B., Mehlau, J., Sander, J.: Carmentis: A co-operative approach towards situation awareness and early warning for the internet. In: Proc. of IMF 2006. LNI, vol.97, pp. 55-66. GI (2006)
    • (2006) Proc. of IMF 2006 LNI , vol.97 , pp. 55-66
    • Grobauer, B.1    Mehlau, J.2    Sander, J.3
  • 2
    • 77955036924 scopus 로고    scopus 로고
    • DShield: DShield website (2008), http://www.dshield.org
    • (2008) DShield Website
  • 5
    • 77953719231 scopus 로고    scopus 로고
    • Intelligent network-based early warning systems
    • CRITIS 2006, López, J. (ed.), Springer, Heidelberg
    • Bsufka, K., Kroll-Peters, O., Albayrak, S.: Intelligent network-based early warning systems. In: López, J. (ed.) CRITIS 2006. LNCS, vol.4347, pp. 103-111. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4347 , pp. 103-111
    • Bsufka, K.1    Kroll-Peters, O.2    Albayrak, S.3
  • 8
    • 33750376598 scopus 로고    scopus 로고
    • The Nepenthes platform: An efficient approach to collect malware
    • RAID 2006, Zamboni, D., Krügel, C. (eds.), Springer, Heidelberg
    • Baecher, P., Koetter, M., Holz, T., Dornseif, M., Freiling, F.: The Nepenthes platform: An efficient approach to collect malware. In: Zamboni, D., Krügel, C. (eds.) RAID 2006. LNCS, vol.4219, pp. 165-184. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4219 , pp. 165-184
    • Baecher, P.1    Koetter, M.2    Holz, T.3    Dornseif, M.4    Freiling, F.5
  • 9
    • 70349098508 scopus 로고    scopus 로고
    • Amun: Python Honeypot, http://amunhoney.sourceforge.net/
    • Python Honeypot
  • 11
    • 78649241967 scopus 로고    scopus 로고
    • Graph-based comparison of executable objects
    • Dullien, T., Rolles, R.: Graph-based comparison of executable objects. In: Proc. of SSTIC 2005 (2005)
    • (2005) Proc. of SSTIC 2005
    • Dullien, T.1    Rolles, R.2
  • 12
    • 49949090311 scopus 로고    scopus 로고
    • Learning and classification of malware behavior
    • DIMVA 2008, Zamboni, D. (ed.), Springer, Heidelberg
    • Rieck, K., Holz, T., Willems, C., Düssel, P., Laskov, P.: Learning and classification of malware behavior. In: Zamboni, D. (ed.) DIMVA 2008. LNCS, vol.5137, pp. 108-125. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5137 , pp. 108-125
    • Rieck, K.1    Holz, T.2    Willems, C.3    Düssel, P.4    Laskov, P.5
  • 13
    • 34047110218 scopus 로고    scopus 로고
    • Toward automated dynamic malware analysis using CWSandbox
    • Willems, C., Holz, T., Freiling, F.: Toward automated dynamic malware analysis using CWSandbox. IEEE Security & Privacy 5(2), 32-39 (2007)
    • (2007) IEEE Security & Privacy , vol.5 , Issue.2 , pp. 32-39
    • Willems, C.1    Holz, T.2    Freiling, F.3
  • 14
    • 0003126321 scopus 로고
    • A general theory of classificatory sorting strategies: II. Clustering systems
    • Lance, G.N., Williams, W.T.: A general theory of classificatory sorting strategies: II. Clustering systems. The Computer Journal 10(3), 271-277 (1967)
    • (1967) The Computer Journal , vol.10 , Issue.3 , pp. 271-277
    • Lance, G.N.1    Williams, W.T.2
  • 15
    • 0029723348 scopus 로고    scopus 로고
    • A robust clustering algorithm based on competitive agglomeration and soft rejection of outliers
    • IEEE, Los Alamitos
    • Frigui, H., Krishnapuram, R.: A robust clustering algorithm based on competitive agglomeration and soft rejection of outliers. In: Proc. of Computer Vision and Pattern Recognition, vol.550. IEEE, Los Alamitos (1996)
    • (1996) Proc. of Computer Vision and Pattern Recognition , vol.550
    • Frigui, H.1    Krishnapuram, R.2
  • 18
    • 38149089416 scopus 로고    scopus 로고
    • Automated classification and analysis of internet malware
    • RAID 2007, Kruegel, C., Lippmann, R., Clark, A. (eds.), Springer, Heidelberg
    • Bailey, M., Oberheide, J., Andersen, J., Mao, Z., Jahanian, F., Nazario, J.: Automated classification and analysis of internet malware. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol.4637, pp. 178-197. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4637 , pp. 178-197
    • Bailey, M.1    Oberheide, J.2    Andersen, J.3    Mao, Z.4    Jahanian, F.5    Nazario, J.6
  • 19
  • 20
    • 38949156579 scopus 로고    scopus 로고
    • Linear-time computation of similarity measures for sequential data
    • Rieck, K., Laskov, P.: Linear-time computation of similarity measures for sequential data. Journal of Machine Learning Research 9, 23-48 (2008)
    • (2008) Journal of Machine Learning Research , vol.9 , pp. 23-48
    • Rieck, K.1    Laskov, P.2
  • 21
    • 77951289154 scopus 로고    scopus 로고
    • Measuring similarity of malware behavior
    • IEEE Computer Society Press, Los Alamitos (
    • Apel, M., Bockermann, C., Meier, M.: Measuring similarity of malware behavior. In: Proc. of 34th LCN 2009. IEEE Computer Society Press, Los Alamitos (2009)
    • (2009) Proc. of 34th LCN 2009
    • Apel, M.1    Bockermann, C.2    Meier, M.3
  • 22
    • 0001704377 scopus 로고
    • On-line construction of suffix trees
    • Ukkonen, E.: On-line construction of suffix trees. Algorithmica 14(3), 249-260 (1995)
    • (1995) Algorithmica , vol.14 , Issue.3 , pp. 249-260
    • Ukkonen, E.1
  • 23
    • 26444432211 scopus 로고    scopus 로고
    • Improving the efficiency of misuse detection
    • DIMVA 2005, Julisch, K., Krügel, C. (eds.), Springer, Heidelberg
    • Meier, M., Schmerl, S., Koenig, H.: Improving the Efficiency of Misuse Detection. In: Julisch, K., Krügel, C. (eds.) DIMVA 2005. LNCS, vol.3548, pp. 188-205. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3548 , pp. 188-205
    • Meier, M.1    Schmerl, S.2    Koenig, H.3
  • 24
    • 33746646762 scopus 로고    scopus 로고
    • Requirements of information reductions for cooperating intrusion detection agents
    • ETRICS 2006, Müller, G. (ed.), Springer, Heidelberg
    • Flegel, U., Biskup, J.: Requirements of information reductions for cooperating intrusion detection agents. In: Müller, G. (ed.) ETRICS 2006. LNCS, vol.3995, pp. 466-480. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3995 , pp. 466-480
    • Flegel, U.1    Biskup, J.2
  • 26
    • 77955044938 scopus 로고    scopus 로고
    • MyNetWatchman: MyNetWatchman website (2008), http://www.mynetwatchman.com
    • (2008) MyNetWatchman Website
  • 27
    • 85081770459 scopus 로고    scopus 로고
    • The internet motion sensor - A distributed blackhole monitoring system
    • The Internet Society
    • Bailey, M., Cooke, E., Jahanian, F., Nazario, J., Watson, D.: The internet motion sensor - a distributed blackhole monitoring system. In: Proc. of NDSS 2005, The Internet Society, pp. 167-179 (2005)
    • (2005) Proc. of NDSS 2005 , pp. 167-179
    • Bailey, M.1    Cooke, E.2    Jahanian, F.3    Nazario, J.4    Watson, D.5
  • 29
    • 16344396406 scopus 로고    scopus 로고
    • Monitoring and early warning for internet worms
    • Zou, C., Gao, L., Gong, W., Towsley, D.: Monitoring and early warning for internet worms. In: Proc. of ACM CCS 2003, pp. 190-199 (2003)
    • (2003) Proc. of ACM CCS , pp. 190-199
    • Zou, C.1    Gao, L.2    Gong, W.3    Towsley, D.4
  • 31
    • 38349051945 scopus 로고    scopus 로고
    • Applying machine learning techniques for detection of malicious code in network traffic
    • KI 2007, Hertzberg, J., Beetz, M., Englert, R. (eds.), Springer, Heidelberg
    • Elovici, Y., Shabtai, A., Moskovitch, R., Tahan, G., Glezer, C.: Applying machine learning techniques for detection of malicious code in network traffic. In: Hertzberg, J., Beetz, M., Englert, R. (eds.) KI 2007. LNCS (LNAI), vol.4667, pp. 44-50. Springer, Heidelberg (2007)
    • (2007) LNCS (LNAI) , vol.4667 , pp. 44-50
    • Elovici, Y.1    Shabtai, A.2    Moskovitch, R.3    Tahan, G.4    Glezer, C.5
  • 32
    • 24944591774 scopus 로고    scopus 로고
    • Adwice - Anomaly detection with real-time incremental clustering
    • ICISC 2004, Park, C.-s., Chee, S. (eds.), Springer, Heidelberg
    • Burbeck, K., Nadjm-Therani, S.: Adwice - anomaly detection with real-time incremental clustering. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, vol.3506, pp. 407-424. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3506 , pp. 407-424
    • Burbeck, K.1    Nadjm-Therani, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.