-
1
-
-
51249112473
-
Nicter: An incident analysis system using correlation between network monitoring and malware analysis
-
K. Nakao, K. Yoshioka, D. Inoue, M. Eto, and K. Rikitake. nicter: An Incident Analysis System using Correlation between Network Monitoring and Malware Analysis. In The 1st Joint Workshop on Information Security (JWIS06), pages 363-377, 2006.
-
(2006)
The 1st Joint Workshop on Information Security (JWIS06)
, pp. 363-377
-
-
Nakao, K.1
Yoshioka, K.2
Inoue, D.3
Eto, M.4
Rikitake, K.5
-
2
-
-
51249111229
-
A novel concept of network incident analysis based on multi-layer observations of malware activities
-
K. Nakao, K. Yoshioka, D. Inoue, and M. Eto. A Novel Concept of Network Incident Analysis based on Multi-layer Observations of Malware Activities. In The 2nd Joint Workshop on Information Security (JWIS07), pages 267-279, 2007.
-
(2007)
The 2nd Joint Workshop on Information Security (JWIS07)
, pp. 267-279
-
-
Nakao, K.1
Yoshioka, K.2
Inoue, D.3
Eto, M.4
-
3
-
-
55149085740
-
Nicter: An incident analysis system toward binding network monitoring with malware analysis
-
D. Inoue, M. Eto, K. Yoshioka, S. Baba, K. Suzuki, J. Nakazato, K. Ohtaka, and K. Nakao. nicter: An Incident Analysis System Toward Binding Network Monitoring with Malware Analysis. In WOMBAT Workshop on Information Security Threats Data Collection and Sharing, pages 58-66, 2008.
-
(2008)
WOMBAT Workshop on Information Security Threats Data Collection and Sharing
, pp. 58-66
-
-
Inoue, D.1
Eto, M.2
Yoshioka, K.3
Baba, S.4
Suzuki, K.5
Nakazato, J.6
Ohtaka, K.7
Nakao, K.8
-
4
-
-
85081770459
-
The internet motion sensor: A distributed blackhole monitoring system
-
Citeseer
-
M. Bailey, E. Cooke, F. Jahanian, J. Nazario, and D. Watson. The Internet Motion Sensor: A distributed blackhole monitoring system. In Proceedings of the 12th ISOC Symposium on Network and Distributed Systems Security (NDSS), pages 167-179. Citeseer, 2005.
-
(2005)
Proceedings of the 12th ISOC Symposium on Network and Distributed Systems Security (NDSS)
, pp. 167-179
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Nazario, J.4
Watson, D.5
-
7
-
-
14944381614
-
-
CAIDA, April
-
D. Moore, C. Shannon, G.M. Voelker, and S. Savage. Network telescopes: Technical report. CAIDA, April, 2004.
-
(2004)
Network Telescopes: Technical Report
-
-
Moore, D.1
Shannon, C.2
Voelker, G.M.3
Savage, S.4
-
8
-
-
44049086375
-
Practical darknet measurement
-
DOI 10.1109/CISS.2006.286376, 4068042, 2006 IEEE Conference on Information Sciences and Systems, CISS 2006 - Proceedings
-
M. Bailey, E. Cooke, F. Jahanian, A. Myrick, and S. Sinha. Practical darknet measurement. In Information Sciences and Systems, 2006 40th Annual Conference on, pages 1496-1501. IEEE, 2007. (Pubitemid 351710247)
-
(2007)
2006 IEEE Conference on Information Sciences and Systems, CISS 2006 - Proceedings
, pp. 1496-1501
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Myrick, A.4
Sinha, S.5
-
9
-
-
14944377862
-
Honeyd-A virtual honeypot daemon
-
Hamburg, Germany
-
N. Provos. Honeyd-a virtual honeypot daemon. In 10th DFNCERT Workshop, Hamburg, Germany, 2003.
-
(2003)
10th DFNCERT Workshop
-
-
Provos, N.1
-
10
-
-
33750320499
-
Automatic handling of protocol dependencies and reaction to 0-day attacks with ScriptGen based honeypots
-
Recent Advances in Intrusion Detection - 9th International Symposium, RAID 2006, Proceedings
-
C. Leita, M. Dacier, and F. Massicotte. Automatic handling of protocol dependencies and reaction to 0-day attacks with ScriptGen based honeypots. In Recent Advances in Intrusion Detection, pages 185-205. Springer, 2006. (Pubitemid 44617853)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4219
, pp. 185-205
-
-
Leita, C.1
Dacier, M.2
Massicotte, F.3
-
12
-
-
34547491379
-
Lessons learned from the deployment of a high-interaction honeypot
-
IEEE
-
E. Alata, V. Nicomette, M. Kâaniche, M. Dacier, and M. Herrb. Lessons learned from the deployment of a high-interaction honeypot. In Dependable Computing Conference, 2006. EDCC'06. Sixth European, pages 39-46. IEEE, 2006.
-
(2006)
Dependable Computing Conference, 2006. EDCC'06. Sixth European
, pp. 39-46
-
-
Alata, E.1
Nicomette, V.2
Kâaniche, M.3
Dacier, M.4
Herrb, M.5
-
13
-
-
79958749992
-
A virus analysis supporting system-for automatic grasping virus behavior by code-analysis result
-
R. Isawa, S. Ichikawa, Y. Shiraishi, M. Mori, and M. Morii. A Virus Analysis Supporting System-For automatic grasping virus behavior by code-analysis result. Joho Shori Gakkai Shinpojiumu Ronbunshu, 1(13):169-174, 2005.
-
(2005)
Joho Shori Gakkai Shinpojiumu Ronbunshu
, vol.1
, Issue.13
, pp. 169-174
-
-
Isawa, R.1
Ichikawa, S.2
Shiraishi, Y.3
Mori, M.4
Morii, M.5
-
14
-
-
77950317603
-
Micro analysis system for analyzing malware code and its behavior on nicter
-
IEICE, Jan.
-
D. Inoue, M. Eto, K. Yoshioka, Y. Hoshizawa, Isawa R., M. Morii, and K. Nakao. Micro analysis system for analyzing malware code and its behavior on nicter. In Symposium on Cryptography and Information Security (SCIS) 2007. IEICE, Jan 2007.
-
(2007)
Symposium on Cryptography and Information Security (SCIS) 2007
-
-
Inoue, D.1
Eto, M.2
Yoshioka, K.3
Hoshizawa, Y.4
Isawa, R.5
Morii, M.6
Nakao, K.7
-
15
-
-
34047110218
-
Toward automated dynamic malware analysis using CWSandbox
-
DOI 10.1109/MSP.2007.45
-
C. Willems, T. Holz, and F. Freiling. Toward automated dynamic malware analysis using cwsandbox. IEEE Security & Privacy, pages 32-39, 2007. (Pubitemid 46527386)
-
(2007)
IEEE Security and Privacy
, vol.5
, Issue.2
, pp. 32-39
-
-
Willems, G.1
Holz, T.2
Freiling, F.3
-
17
-
-
76249083391
-
Practical correlation analysis between scan and malware profiles against zero-day attacks based on darknet monitoring
-
K. Nakao, D. Inoue, M. Eto, and K. Yoshioka. Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring. IEICE TRANSACTIONS on Information and Systems, 92(5):787- 798, 2009.
-
(2009)
IEICE Transactions on Information and Systems
, vol.92
, Issue.5
, pp. 787-798
-
-
Nakao, K.1
Inoue, D.2
Eto, M.3
Yoshioka, K.4
-
18
-
-
0006993818
-
-
Microsoft Corporation. http://www.microsoft.com/technet/security/ Bulletin/MS08-067.mspx.
-
Microsoft Corporation
-
-
-
20
-
-
33845582612
-
Hotspots: The root causes of non-uniformity in self-propagating malware
-
DOI 10.1109/DSN.2006.39, 1633507, Proceedings - DSN 2006: 2006 International Conference on Dependable Systems and Networks
-
E. Cooke, Z.M. Mao, and F. Jahanian. Hotspots: The root causes of non-uniformity in self-propagating malware. In Dependable Systems and Networks, 2006. DSN 2006. International Conference on, pages 179-188. IEEE, 2006. (Pubitemid 44930419)
-
(2006)
Proceedings of the International Conference on Dependable Systems and Networks
, vol.2006
, pp. 179-188
-
-
Cooke, E.1
Mao, Z.M.2
Jahanian, F.3
|