메뉴 건너뛰기




Volumn 29, Issue 7, 2011, Pages 1349-1357

Attack pattern discovery in forensic investigation of network attacks

Author keywords

attack patterns; network forensics; security; suspicion feedback

Indexed keywords

ATTACK PATTERNS; FEEDBACK MECHANISMS; FORENSIC INVESTIGATION; ITERATIVE ALGORITHM; NETWORK ATTACK; NETWORK FORENSICS; NETWORK TRAFFIC; SECURITY; SUSPICION FEEDBACK; UNSUPERVISED ALGORITHMS;

EID: 80051527078     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSAC.2011.110802     Document Type: Article
Times cited : (16)

References (42)
  • 2
    • 3042852281 scopus 로고    scopus 로고
    • Network traffic as a source of evidence: Tool strengths, weaknesses, and future needs
    • E. Casey, "Network traffic as a source of evidence: Tool strengths, weaknesses, and future needs," Elsevier Journal of Digital Investigation, vol. 1, pp. 28-43, 2004.
    • (2004) Elsevier Journal of Digital Investigation , vol.1 , pp. 28-43
    • Casey, E.1
  • 3
    • 0036870198 scopus 로고    scopus 로고
    • Network forensics analysis
    • V. e. a. Corey, "Network forensics analysis," IEEE Internet Comput., vol. 6, no. 6, 2002.
    • (2002) IEEE Internet Comput. , vol.6 , Issue.6
    • Corey, V.E.A.1
  • 4
    • 4243105024 scopus 로고    scopus 로고
    • The discipline of internet forensics
    • August
    • B. H., "The discipline of internet forensics," Communications of the ACM, vol. 46, no. 8, August 2003.
    • (2003) Communications of the ACM , vol.46 , Issue.8
    • B, H.1
  • 5
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • V. Paxson, "Bro: A system for detecting network intruders in real-time," Computer Networks, no. 31, pp. 2435-2463, 1999.
    • (1999) Computer Networks , Issue.31 , pp. 2435-2463
    • Paxson, V.1
  • 7
    • 33746603312 scopus 로고    scopus 로고
    • Mining anomalies using traffic feature distributions
    • August 21-26 Philadelphia, PA
    • A. Lakhina, M. Crovella, and C. Diot, "Mining anomalies using traffic feature distributions," in Proc. SIGCOMM'05, August 21-26, 2005, Philadelphia, PA.
    • (2005) Proc. SIGCOMM'05
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 9
    • 84858486361 scopus 로고    scopus 로고
    • "Netdetector," http://www.niksun.com/product.php?id=4.
    • Netdetector
  • 10
    • 84885891812 scopus 로고    scopus 로고
    • "Networkminer," http://networkminer.wiki.sourceforge.net/ NetworkMiner.
    • Networkminer
  • 11
    • 84860092607 scopus 로고    scopus 로고
    • "Netintercept," http://sandstorm.net/products/netintercept.
    • Netintercept
  • 12
    • 80051534564 scopus 로고    scopus 로고
    • "Wireshark," http://www.wireshark.org.
    • Wireshark
  • 13
    • 80051490697 scopus 로고    scopus 로고
    • "Snort," http://www.snort.org.
    • Snort
  • 17
    • 77949456302 scopus 로고    scopus 로고
    • New payload attribution methods for network forensic investigations
    • 2-15 32, February
    • M. Ponec, G. P., W. J., and B. H., "New payload attribution methods for network forensic investigations," ACM Transactions on Information and System Security, vol. 13, no. 2, pp. 15:2-15:32, February 2006.
    • (2006) ACM Transactions on Information and System Security , vol.13 , Issue.2 , pp. 15
    • Ponec, M.1
  • 18
    • 80051487960 scopus 로고    scopus 로고
    • The leurre.com project
    • "The leurre.com project," http://www.leurrecom.org.
  • 19
    • 0012109964 scopus 로고    scopus 로고
    • The Honeynet Project (ed.) :, 2nd ed. Addison Wesley Professional
    • The Honeynet Project (ed.): Know Your Enemy: Learning about Security Threats, 2nd ed. Addison Wesley Professional, 2004.
    • (2004) Know Your Enemy: Learning about Security Threats
  • 24
    • 26444580931 scopus 로고    scopus 로고
    • Honeypot-based forensics
    • Brisbane, Australia, May 23-27
    • F. Pouget and M. Dacier, "Honeypot-based forensics," in Proc. AusCERT2004, Brisbane, Australia, May 23-27 2004.
    • (2004) Proc. AusCERT2004
    • Pouget, F.1    Dacier, M.2
  • 26
    • 48749129421 scopus 로고    scopus 로고
    • A framework for attack patterns' discovery in honeynet data
    • O. Thonnard and M. Dacier, "A framework for attack patterns' discovery in honeynet data," Digital Investigation, vol. 8, pp. S128-S139, 2008.
    • (2008) Digital Investigation , vol.8
    • Thonnard, O.1    Dacier, M.2
  • 29
    • 14944346102 scopus 로고    scopus 로고
    • Automatically inferring patterns of resource consumption in network traffic
    • Karlsruhe, Germany
    • C. Estan, S. Savage, and G. Varghese, "Automatically inferring patterns of resource consumption in network traffic," in Proc. SIGCOMM'03, August 25-29, Karlsruhe, Germany 2003.
    • (2003) Proc. SIGCOMM'03, August , pp. 25-29
    • Estan, C.1    Savage, S.2    Varghese, G.3
  • 30
    • 33750346628 scopus 로고    scopus 로고
    • Blinc: Multilevel traffic classification in the dark
    • August Philadelphia, Pennsylvania
    • T. Karagiannis, K. Papagiannaki, and M. Faloutsos, "Blinc: Multilevel traffic classification in the dark," in Proc. SIGCOMM'05, August 21-26, Philadelphia, Pennsylvania 2005.
    • (2005) Proc. SIGCOMM'05 , pp. 21-26
    • Karagiannis, T.1    Papagiannaki, K.2    Faloutsos, M.3
  • 31
    • 34547427252 scopus 로고    scopus 로고
    • Semi-automated discovery of application session structure
    • DOI 10.1145/1177080.1177096, Proceedings of the 2006 ACM SIGCOMM Internet Measurement Conference, IMC 2006
    • J. Kannan, J. Jung, V. Paxson, and C. Koksal, "Semi-automated discovery of application session structure," in Proc. Sixth ACM SIGCOMM Conference on Internet Measurement (IMC'06), 2006, Rio de Janeiro, Brazil, pp. 119-132. (Pubitemid 47165594)
    • (2006) Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC , pp. 119-132
    • Kannan, J.1    Jung, J.2    Paxson, V.3    Koksal, C.E.4
  • 33
    • 80051520218 scopus 로고    scopus 로고
    • Wda: A web farm distributed denial of service attack attenuator
    • May
    • E. Doron and A. Wool, "Wda: A web farm distributed denial of service attack attenuator," Computer Networks, vol. 10, no. 1016, May 2010.
    • (2010) Computer Networks , vol.10 , Issue.1016
    • Doron, E.1    Wool, A.2
  • 34
    • 18144375196 scopus 로고    scopus 로고
    • Detecting distributed denial-of-service attacks by analyzing tcp syn packets statistically
    • Dallas, TX
    • Y. Ohsita and S. Ata, "Detecting distributed denial-of-service attacks by analyzing tcp syn packets statistically," in Proc. IEEE GLOBECOM, Dallas, TX, 2004, p. 20432049.
    • (2004) Proc. IEEE GLOBECOM , pp. 20432049
    • Ohsita, Y.1    Ata, S.2
  • 36
    • 80051519211 scopus 로고    scopus 로고
    • Georgia ddos attacks a quick summary of observations
    • "Georgia ddos attacks a quick summary of observations," http://asert.arbornetworks.com/2008/08/ georgia-ddos-attacks-a-quick-summary-of- observations/.
  • 38
    • 0003516333 scopus 로고    scopus 로고
    • Department of Computer Engineering, Chalmers University of Technology, Tech. Rep., March
    • S. Axelsson, "Intrusion detection systems: A survey and taxonomy," Department of Computer Engineering, Chalmers University of Technology, Tech. Rep., March 2000.
    • (2000) Intrusion Detection Systems: A Survey and Taxonomy
    • Axelsson, S.1
  • 39
    • 80051495840 scopus 로고    scopus 로고
    • Tripwire
    • "Tripwire," http://www.tripwire.com/.
  • 40
    • 85077745984 scopus 로고
    • Tcp wrapper: Network monitoring, access control, and booby traps
    • September 14-16
    • W. Venema, "Tcp wrapper: Network monitoring, access control, and booby traps," in Proc. 3rd USENIX UNIX Security Symposium, September 14-16 1992, pp. 85-92.
    • (1992) Proc. 3rd USENIX UNIX Security Symposium , pp. 85-92
    • Venema, W.1
  • 41
    • 0004250162 scopus 로고    scopus 로고
    • Northcutt Cooper Fearnow, and Frederick,. Sams
    • Northcutt, Cooper, Fearnow, and Frederick, Intrusion Signatures and Analysis. Sams, 2001.
    • (2001) Intrusion Signatures and Analysis
  • 42
    • 80051498549 scopus 로고    scopus 로고
    • rfeti Nmap nmap.org
    • "Nmap," nmap.org.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.