메뉴 건너뛰기




Volumn , Issue , 2013, Pages 248-254

The big four - What we did wrong in advanced persistent threat detection?

Author keywords

Advanced Persistent Threat; Duqu; Exploitation; Flame; Red October; Stuxnet; Zero Day

Indexed keywords

ADVANCED PERSISTENT THREAT; DUQU; EXPLOITATION; FLAME; RED OCTOBER; STUXNET; ZERO DAY;

EID: 84892403835     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2013.32     Document Type: Conference Paper
Times cited : (161)

References (20)
  • 1
    • 84892381669 scopus 로고    scopus 로고
    • Fisher, D.:Threatpost. [Online] 15June2012 [Cited: 0102 2013] https://threatpost.com/en-us/blogs/what-have-we-learned-flame-malware-061512
    • Threatpost
    • Fisher, D.1
  • 2
    • 84892392920 scopus 로고    scopus 로고
    • January
    • Lemos, R.: Infoworld. [Online] 19 January 2011 [Cited: 02 02 2013] http://www.infoworld.com/t/malware/stuxnet-attack-more-effective-bombs-888
    • (2011) Infoworld
    • Lemos, R.1
  • 3
    • 84900602050 scopus 로고    scopus 로고
    • 14January 2013 [Cited: 12 02
    • Schwartz, M.: Information week. [Online] 14January 2013 [Cited: 12 02 2013] http://www.informationweek.com/security/attacks/red-october-espionage- network-rivals-fla/24014621B
    • (2013) Information Week
    • Schwartz, M.1
  • 4
    • 79953895474 scopus 로고    scopus 로고
    • Lessons from Stuxnet
    • April, DOI=10.1109/MC.2011.11B
    • Chen, T., Abu-Nimeh, S.: Lessons from Stuxnet. In: Computer, Vol. 44, No. 4, pp. 91-93, April 2011 DOI=10.1109/MC.2011.11B http://dx.doi.org/10.1109/MC. 2011.11B
    • (2011) Computer , vol.44 , Issue.4 , pp. 91-93
    • Chen, T.1    Abu-Nimeh, S.2
  • 5
    • 84922491429 scopus 로고    scopus 로고
    • An insidelookatstuxnet
    • Larimer, J.: An insidelookatStuxnet. IBM, 2010.
    • (2010) IBM
    • Larimer, J.1
  • 7
    • 84894191142 scopus 로고    scopus 로고
    • The cousins of stuxnet: Duqu, flame, and causs
    • Bencsath, B., Pek, C., Buttyan, L., Felegyhazi, M.: The Cousins of Stuxnet: Duqu, Flame, and Causs. In: Future Internet, Vol. 4, No. 4, pp. 971-1003, 2012.
    • (2012) Future Internet , vol.4 , Issue.4 , pp. 971-1003
    • Bencsath, B.1    Pek, C.2    Buttyan, L.3    Felegyhazi, M.4
  • 8
    • 84892420573 scopus 로고    scopus 로고
    • 14January 2013 [Cited: 1B 01
    • Kaspersky Labs. "Red October" DiplomaticCyberAttacksInvestigation. [Online] 14January 2013 [Cited: 1B 01 2013] http://www.securelist.com/en/analysis/204792262/Red-October-Diplomatic-Cyber- Attacks-Investigation
    • (2013) Red October"Diplomaticcyberattacksinvestigation
    • Labs, K.1
  • 10
    • 79957616447 scopus 로고    scopus 로고
    • Stuxnet: Dissecting a cyberwarfare weapon
    • May-June
    • Langner, R.: Stuxnet: Dissecting a Cyberwarfare Weapon. In: IEEE Security & Privacy, Vol. 9, No. 3, pp. 49-B1, May-June 2011.
    • (2011) IEEE Security &Privacy , vol.9 , Issue.3
    • Langner, R.1
  • 14
    • 84892413738 scopus 로고    scopus 로고
    • [Cited: 1102 2013.]
    • Microsoft: [Online] [Cited: 1102 2013.] http://office.microsoft.com/en- 001/excel-help/what-is-protected-view-HA0103BB931.aspx.
  • 16
    • 84892406090 scopus 로고
    • Intrusion detection: Evaluation and performance issues of the securenet system
    • October
    • Denault, M., 6ritzalis, D., Karagiannis, D., Spirakis, P.: Intrusion detection: Evaluation and performance issues of the SECURENET system. In: Computers&Security, Vol. 13, No. 6, pp. 49B-B08, October 1994.
    • (1994) Computers&Security , vol.13 , Issue.6
    • Denault, M.1    Critzalis, D.2    Karagiannis, D.3    Spirakis, P.4
  • 17
    • 84892394786 scopus 로고
    • Design of a neural network for recognition and classification of computer viruses
    • October
    • Doumas, A., Mavroudakis, K., Critzalis, D., Katsikas, S.: Design of a neural network for recognition and classification of computer viruses. In: Computers& Security, Vol. 14, No. B, pp. 43B-448, October 199B.
    • (1991) Computers&Security , vol.14
    • Doumas, A.1    Mavroudakis, K.2    Critzalis, D.3    Katsikas, S.4
  • 19
    • 33947651649 scopus 로고    scopus 로고
    • Long-term verifiability of healthcare records authenticity
    • Lekkas, D., Critzalis, D.: Long-term verifiability of healthcare records authenticity. In: InternationalJournal ofMedical Informatics, Vol. 76, Issue B-6, pp. 442-448, 2006.
    • (2006) International Journal Of Medical Informatics , vol.76 , Issue.6 , pp. 442-448
    • Lekkas, D.1    Critzalis, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.