메뉴 건너뛰기




Volumn , Issue , 2011, Pages 37-45

Nicter: A large-scale network incident analysis system: Case studies for understanding threat landscape

Author keywords

Correlation analysis; Malware analysis; Network monitoring

Indexed keywords

ANALYSIS RESULTS; CORRELATION ANALYSIS; DARKNET; EMERGENCY RESPONSE; EXECUTABLES; GLOBAL TRENDS; IP ADDRESSS; LARGE-SCALE NETWORK; LONG-TERM OPERATION; MALWARE ANALYSIS; MALWARES; NETWORK INCIDENTS; NETWORK MONITORING; NETWORK THREATS; ROOT CAUSE;

EID: 79958707632     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1978672.1978677     Document Type: Conference Paper
Times cited : (27)

References (20)
  • 6
  • 9
    • 14944377862 scopus 로고    scopus 로고
    • Honeyd-A virtual honeypot daemon
    • Hamburg, Germany
    • N. Provos. Honeyd-a virtual honeypot daemon. In 10th DFNCERT Workshop, Hamburg, Germany, 2003.
    • (2003) 10th DFNCERT Workshop
    • Provos, N.1
  • 13
    • 79958749992 scopus 로고    scopus 로고
    • A virus analysis supporting system-for automatic grasping virus behavior by code-analysis result
    • R. Isawa, S. Ichikawa, Y. Shiraishi, M. Mori, and M. Morii. A Virus Analysis Supporting System-For automatic grasping virus behavior by code-analysis result. Joho Shori Gakkai Shinpojiumu Ronbunshu, 1(13):169-174, 2005.
    • (2005) Joho Shori Gakkai Shinpojiumu Ronbunshu , vol.1 , Issue.13 , pp. 169-174
    • Isawa, R.1    Ichikawa, S.2    Shiraishi, Y.3    Mori, M.4    Morii, M.5
  • 15
    • 34047110218 scopus 로고    scopus 로고
    • Toward automated dynamic malware analysis using CWSandbox
    • DOI 10.1109/MSP.2007.45
    • C. Willems, T. Holz, and F. Freiling. Toward automated dynamic malware analysis using cwsandbox. IEEE Security & Privacy, pages 32-39, 2007. (Pubitemid 46527386)
    • (2007) IEEE Security and Privacy , vol.5 , Issue.2 , pp. 32-39
    • Willems, G.1    Holz, T.2    Freiling, F.3
  • 17
    • 76249083391 scopus 로고    scopus 로고
    • Practical correlation analysis between scan and malware profiles against zero-day attacks based on darknet monitoring
    • K. Nakao, D. Inoue, M. Eto, and K. Yoshioka. Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring. IEICE TRANSACTIONS on Information and Systems, 92(5):787- 798, 2009.
    • (2009) IEICE Transactions on Information and Systems , vol.92 , Issue.5 , pp. 787-798
    • Nakao, K.1    Inoue, D.2    Eto, M.3    Yoshioka, K.4
  • 18
    • 0006993818 scopus 로고    scopus 로고
    • Microsoft Corporation. http://www.microsoft.com/technet/security/ Bulletin/MS08-067.mspx.
    • Microsoft Corporation
  • 20
    • 33845582612 scopus 로고    scopus 로고
    • Hotspots: The root causes of non-uniformity in self-propagating malware
    • DOI 10.1109/DSN.2006.39, 1633507, Proceedings - DSN 2006: 2006 International Conference on Dependable Systems and Networks
    • E. Cooke, Z.M. Mao, and F. Jahanian. Hotspots: The root causes of non-uniformity in self-propagating malware. In Dependable Systems and Networks, 2006. DSN 2006. International Conference on, pages 179-188. IEEE, 2006. (Pubitemid 44930419)
    • (2006) Proceedings of the International Conference on Dependable Systems and Networks , vol.2006 , pp. 179-188
    • Cooke, E.1    Mao, Z.M.2    Jahanian, F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.