메뉴 건너뛰기




Volumn 7462 LNCS, Issue , 2012, Pages 64-85

Industrial espionage and targeted attacks: Understanding the characteristics of an escalating threat

Author keywords

[No Author keywords available]

Indexed keywords

DATA ANALYTICS; IN-DEPTH ANALYSIS; INCIDENT REPORTS; INDUSTRIAL ESPIONAGE; LOW LEVEL; MALWARE ANALYSIS; MALWARES; MODUS OPERANDI; SOCIAL ENGINEERING; SYMANTEC; ZERO DAY ATTACK;

EID: 84867845138     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-33338-5_4     Document Type: Conference Paper
Times cited : (44)

References (23)
  • 1
    • 84893108391 scopus 로고    scopus 로고
    • Zero-day Attack, http://en.wikipedia.org/wiki/Zero-day-attack
    • Zero-day Attack
  • 2
    • 84867859255 scopus 로고    scopus 로고
    • Understanding the Advanced Persistent Threat
    • July
    • Bejtlich, R.: Understanding the Advanced Persistent Threat. Searchsecurity Magazine (July 2010), http://searchsecurity.techtarget.com/ magazineContent/Understanding-the-advanced-persistent-threat
    • (2010) Searchsecurity Magazine
    • Bejtlich, R.1
  • 4
    • 78249283520 scopus 로고    scopus 로고
    • An Analysis of Rogue AV Campaigns
    • Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. Springer, Heidelberg
    • Cova, M., Leita, C., Thonnard, O., Keromytis, A.D., Dacier, M.: An Analysis of Rogue AV Campaigns. In: Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. LNCS, vol. 6307, pp. 442-463. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6307 , pp. 442-463
    • Cova, M.1    Leita, C.2    Thonnard, O.3    Keromytis, A.D.4    Dacier, M.5
  • 5
    • 71549158205 scopus 로고    scopus 로고
    • The WOMBAT Attack Attribution Method: Some Results
    • Prakash, A., Sen Gupta, I. (eds.) ICISS 2009. Springer, Heidelberg
    • Dacier, M., Pham, V., Thonnard, O.: The WOMBAT Attack Attribution Method: Some Results. In: Prakash, A., Sen Gupta, I. (eds.) ICISS 2009. LNCS, vol. 5905, pp. 14-18. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5905 , pp. 14-18
    • Dacier, M.1    Pham, V.2    Thonnard, O.3
  • 7
    • 79958736290 scopus 로고    scopus 로고
    • Toward a Standard Benchmark for Computer Security Research: The Worldwide Intelligence Network Environment (WINE)
    • Dumitras, T., Shou, D.: Toward a Standard Benchmark for Computer Security Research: The Worldwide Intelligence Network Environment (WINE). In: EuroSys BADGERS Workshop (2011)
    • EuroSys BADGERS Workshop (2011)
    • Dumitras, T.1    Shou, D.2
  • 9
    • 52249094557 scopus 로고    scopus 로고
    • Identifying almost identical files using context triggered piecewise hashing
    • Kornblum, J.: Identifying almost identical files using context triggered piecewise hashing. Digital Investigation 3(suppl.), 91-97 (2006)
    • (2006) Digital Investigation , vol.3 , Issue.SUPPL. , pp. 91-97
    • Kornblum, J.1
  • 14
    • 84867870246 scopus 로고    scopus 로고
    • Symantec November
    • Symantec. Symantec Intelligence Report (November 2011), http://bit.ly/slWzF5
    • (2011) Symantec Intelligence Report
  • 15
    • 84867850003 scopus 로고    scopus 로고
    • White paper
    • Symantec Security Response. The Luckycat Hackers, White paper, http://www.symantec.com/security-response/whitepapers.jsp
    • The Luckycat Hackers
  • 17
    • 84867877572 scopus 로고    scopus 로고
    • The Ponemon Institute. Sponsored by Netwitness June
    • The Ponemon Institute. Growing Risk of Advanced Threats. Sponsored by Netwitness (June 2010), http://www.netwitness.com/resources/whitepapers
    • (2010) Growing Risk of Advanced Threats
  • 18
    • 84857365510 scopus 로고    scopus 로고
    • The Security for Business Innovation Council. August
    • The Security for Business Innovation Council. When Advanced Persistent Threats Go Mainstream (August 2011), http://www.rsa.com/go/innovation/index.html
    • (2011) When Advanced Persistent Threats Go Mainstream
  • 21
    • 80053626479 scopus 로고    scopus 로고
    • On a multicriteria clustering approach for attack attribution
    • Thonnard, O., Mees, W., Dacier, M.: On a multicriteria clustering approach for attack attribution. SIGKDD Explor. Newsl. 12(1), 11-20 (2010)
    • (2010) SIGKDD Explor. Newsl. , vol.12 , Issue.1 , pp. 11-20
    • Thonnard, O.1    Mees, W.2    Dacier, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.