메뉴 건너뛰기




Volumn , Issue , 2012, Pages

Investigating the dark cyberspace: Profiling, threat-based analysis and correlation

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION LAYER PROTOCOLS; CYBER THREATS; CYBERSPACES; DARKNET; DOMAIN NAMES; IN-DEPTH UNDERSTANDING; IP CLASS; RULE MINING TECHNIQUES; THREAT SCENARIOS;

EID: 84872083809     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CRISIS.2012.6378947     Document Type: Conference Paper
Times cited : (31)

References (30)
  • 1
    • 0037228072 scopus 로고    scopus 로고
    • The law, cybercrime, risk assessment and cyber protection
    • Stephen Hinde. The law, cybercrime, risk assessment and cyber protection. Computers & Security, pages 90-95, 2003.
    • (2003) Computers & Security , pp. 90-95
    • Hinde, S.1
  • 2
    • 84872054085 scopus 로고    scopus 로고
    • Available at
    • Public Safety Canada. Canada's Cyber Security Strategy, 2009. Available at: http://www.publicsafety.gc.ca/prg/ns/cbr/-fl/ccss-scc-eng.pdf.
    • (2009) Canada's Cyber Security Strategy
  • 3
    • 85084163190 scopus 로고    scopus 로고
    • A virtual honeypot framework
    • SSYM'04, Berkeley, CA, USA, USENIX Association
    • Niels Provos. A virtual honeypot framework. In Proceedings of the 13th conference on USENIX Security Symposium - Volume 13, SSYM'04, pages 1-1, Berkeley, CA, USA, 2004. USENIX Association.
    • (2004) Proceedings of the 13th Conference on USENIX Security Symposium , vol.13 , pp. 1
    • Provos, N.1
  • 15
    • 33750013256 scopus 로고    scopus 로고
    • Denial of service attacks targeting a SIP VoIP infrastructure: Attack scenarios and prevention mechanisms
    • September-October
    • D. Sisalem, J. Kuthan, and S. Ehlert. Denial of service attacks targeting a SIP VoIP infrastructure: attack scenarios and prevention mechanisms. Network, IEEE, 20(5):26-31, September-October 2006.
    • (2006) Network, IEEE , vol.20 , Issue.5 , pp. 26-31
    • Sisalem, D.1    Kuthan, J.2    Ehlert, S.3
  • 17
    • 84872088691 scopus 로고    scopus 로고
    • Microsoft Security TechCenter. Available at
    • Microsoft Security TechCenter. Microsoft security bulletin ms09-018 - critical. Available at: http://technet.microsoft.com/en-us/security/bulletin/ MS09-018.
    • Microsoft Security Bulletin Ms09-018 - Critical
  • 18
    • 84872073027 scopus 로고    scopus 로고
    • Available at
    • Saumil Shah. Top ten web attacks. Available at: http://www.blackhat.com/ presentations/bh-asia-02/bh-asia-02-shah.pdf .
    • Top Ten Web Attacks
    • Shah, S.1
  • 19
    • 84872091793 scopus 로고    scopus 로고
    • Learn Security Online. Available at
    • Learn Security Online. MS terminal service cracking. Available at: http://www.carnal0wnage.com/papers/lso-ms-terminal-server-cracking.pdf.
    • MS Terminal Service Cracking
  • 20
    • 84872067597 scopus 로고    scopus 로고
    • Available at
    • Snort. Available at: http://www.snort.org.
  • 21
    • 84870952509 scopus 로고    scopus 로고
    • last accessed on December 2011
    • The bro network security monitor. http://bro-ids.org/, last accessed on December 2011.
    • The Bro Network Security Monitor
  • 23
    • 84872072404 scopus 로고    scopus 로고
    • National Institute of Standards and Technology (NIST)-National Cyber-Alert System. Available at
    • National Institute of Standards and Technology (NIST)-National Cyber-Alert System. Vulnerability summary for cve-2007-2931, 2011. Available at: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-2931.
    • (2011) Vulnerability Summary for Cve-2007-2931
  • 24
    • 84872055674 scopus 로고    scopus 로고
    • Available at
    • Sourcefire-Snort, 2011. Available at: http://www.snort.org/search/sid/ 587.
    • (2011) Sourcefire-Snort
  • 25
    • 0027621699 scopus 로고
    • Mining association rules between sets of items in large databases
    • June
    • R. Agrawal, T. Imielinski, and A. Swami. Mining association rules between sets of items in large databases. ACM SIGMOD Record, 22(2):207-216, June 1993.
    • (1993) ACM SIGMOD Record , vol.22 , Issue.2 , pp. 207-216
    • Agrawal, R.1    Imielinski, T.2    Swami, A.3
  • 26
    • 0003372359 scopus 로고    scopus 로고
    • Mining frequent patterns by pattern-growth: Methodology and implications
    • December
    • J. Han and J. Pei. Mining frequent patterns by pattern-growth: methodology and implications. ACM SIGKDD Explorations Newsletter, pages 14-20, December 2000.
    • (2000) ACM SIGKDD Explorations Newsletter , pp. 14-20
    • Han, J.1    Pei, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.