메뉴 건너뛰기




Volumn 7, Issue 10, 2014, Pages 1612-1621

A model of analyzing cyber threats trend and tracing potential attackers based on darknet traffic

Author keywords

Cyber threats trend; Darknet; Tracing potential attackers

Indexed keywords

CODES (SYMBOLS);

EID: 84908162673     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.796     Document Type: Article
Times cited : (10)

References (35)
  • 2
    • 3142623031 scopus 로고    scopus 로고
    • Clustering intrusion detection alarms to support root cause analysis
    • ACM Press
    • Julisch K. Clustering intrusion detection alarms to support root cause analysis. ACM Transactions on Information and System Security ACM Press, 2003; 6(4): 443-471.
    • (2003) ACM Transactions on Information and System Security , vol.6 , Issue.4 , pp. 443-471
    • Julisch, K.1
  • 4
    • 35048852163 scopus 로고    scopus 로고
    • A novel framework for alert correlation and understanding, Proc. on ACNS 2004, LNCS 3089
    • Yu D, Frincke D. A novel framework for alert correlation and understanding, Proc. on ACNS 2004, LNCS 3089, 2004; 452-466.
    • (2004) , pp. 452-466
    • Yu, D.1    Frincke, D.2
  • 5
    • 84908184342 scopus 로고    scopus 로고
    • Using alert cluster to reduce IDS alerts, ICCIT2010, IEEE
    • Humphrey WN, Luo J. Using alert cluster to reduce IDS alerts, ICCIT2010, IEEE, 2010; 467-471.
    • (2010) , pp. 467-471
    • Humphrey, W.N.1    Luo, J.2
  • 6
    • 78651574351 scopus 로고    scopus 로고
    • A novel data mining-based method for alert reduction and analysis
    • Fu X, Shi J, Xie L. A novel data mining-based method for alert reduction and analysis. Journal of Networks 2010; 5(1):88-97.
    • (2010) Journal of Networks , vol.5 , Issue.1 , pp. 88-97
    • Fu, X.1    Shi, J.2    Xie, L.3
  • 7
    • 26444495635 scopus 로고    scopus 로고
    • IDS false alarm reduction using continuous and discontinuous patterns, Proceedings of ACNS 2005, LNCS
    • Alharby A, Imai H. IDS false alarm reduction using continuous and discontinuous patterns, Proceedings of ACNS 2005, LNCS, 2005; 192-205.
    • (2005) , pp. 192-205
    • Alharby, A.1    Imai, H.2
  • 8
    • 23944484457 scopus 로고    scopus 로고
    • IDS false alarm filtering using KNN classifier, 5th International Workshop, WISA 2004, LNCS
    • Kwok HL, Lam FK. IDS false alarm filtering using KNN classifier, 5th International Workshop, WISA 2004, LNCS, 2004; 114-121.
    • (2004) , pp. 114-121
    • Kwok, H.L.1    Lam, F.K.2
  • 9
    • 26444436687 scopus 로고    scopus 로고
    • Using adaptive alert classification to reduce false positives in intrusion detection, 7th International Symposium RAID 2004, LNCS
    • Pietraszek T. Using adaptive alert classification to reduce false positives in intrusion detection, 7th International Symposium RAID 2004, LNCS, 2004; 102-124.
    • (2004) , pp. 102-124
    • Pietraszek, T.1
  • 10
    • 0347742772 scopus 로고    scopus 로고
    • Intrusion detection systems and multisensor data fusion
    • In, ACM Press: New York, NY, USA
    • Bass T. Intrusion detection systems and multisensor data fusion. In Communications of the ACM, ACM Press: New York, NY, USA, 2000; 99-105.
    • (2000) Communications of the ACM , pp. 99-105
    • Bass, T.1
  • 11
    • 26944446508 scopus 로고    scopus 로고
    • Alarm clustering for intrusion detection systems in computer networks, MLDM 2005, LNAI 3587
    • Giacinto G, Perdisci R, Roli F. Alarm clustering for intrusion detection systems in computer networks, MLDM 2005, LNAI 3587, 2005; 184-193.
    • (2005) , pp. 184-193
    • Giacinto, G.1    Perdisci, R.2    Roli, F.3
  • 12
    • 33750327345 scopus 로고    scopus 로고
    • A framework for the application of association rule mining in large intrusion detection infrastructures, RAID 2006, LNCS 4219
    • Treinen JJ, Thurimella R. A framework for the application of association rule mining in large intrusion detection infrastructures, RAID 2006, LNCS 4219, 2006; 1-18.
    • (2006) , pp. 1-18
    • Treinen, J.J.1    Thurimella, R.2
  • 15
    • 0141540496 scopus 로고    scopus 로고
    • Y-means: a clustering method for intrusion detection
    • In IEEE Canadian Conference on Electrical and Computer Engineering, Proceedings
    • Guan Y, Ghorbani A, Belacel N. Y-means: a clustering method for intrusion detection, In IEEE Canadian Conference on Electrical and Computer Engineering, Proceedings, 2003.
    • (2003)
    • Guan, Y.1    Ghorbani, A.2    Belacel, N.3
  • 17
    • 84908184337 scopus 로고    scopus 로고
    • Unsupervised anomaly detection in network intrusion detection using clusters, ACSC2005
    • Leung K, Leckie C. Unsupervised anomaly detection in network intrusion detection using clusters, ACSC2005, 2005.
    • (2005)
    • Leung, K.1    Leckie, C.2
  • 19
    • 53849091351 scopus 로고    scopus 로고
    • A generalized feature extraction scheme to detect 0-day attacks via IDS alerts, The 2008 International Symposium on Applications and the Internet (SAINT2008), The IEEE CS Press, July - 1 Aug.
    • Song J, Takakura H, Kwon Y. A generalized feature extraction scheme to detect 0-day attacks via IDS alerts, The 2008 International Symposium on Applications and the Internet (SAINT2008), The IEEE CS Press, July - 1 Aug. 2008; 28: 51-56.
    • (2008) , vol.28 , pp. 51-56
    • Song, J.1    Takakura, H.2    Kwon, Y.3
  • 20
    • 84908184336 scopus 로고    scopus 로고
    • A comparative study of anomaly detection schemes in network intrusion detection, In Proceedings of the Third SIAM International Conference on Data Mining
    • Lazarevic A, Ertoz L, Kumar V, Ozgur A, Srivastava J. A comparative study of anomaly detection schemes in network intrusion detection, In Proceedings of the Third SIAM International Conference on Data Mining, 2003.
    • (2003)
    • Lazarevic, A.1    Ertoz, L.2    Kumar, V.3    Ozgur, A.4    Srivastava, J.5
  • 21
    • 37249023319 scopus 로고    scopus 로고
    • Comparative study of unsupervised machine learning and data mining techniques for intrusion detection, MLDM 2007, LNAI 4571
    • Reza S, Ali A, Ghorbani A. Comparative study of unsupervised machine learning and data mining techniques for intrusion detection, MLDM 2007, LNAI 4571, 2007; 404-418.
    • (2007) , pp. 404-418
    • Reza, S.1    Ali, A.2    Ghorbani, A.3
  • 23
    • 84908184334 scopus 로고    scopus 로고
    • The Honeynet Project,
    • The Honeynet Project, http://www.honeynet.org/.
  • 24
    • 33846316416 scopus 로고    scopus 로고
    • Scriptgen: an automated script generation tool for honeyd
    • Proceedings of the 21st Annual Computer Security Applications Conference
    • Leita C, Mermoud K, Dacier M. Scriptgen: an automated script generation tool for honeyd, In Proceedings of the 21st Annual Computer Security Applications Conference, 2005.
    • (2005)
    • Leita, C.1    Mermoud, K.2    Dacier, M.3
  • 25
    • 55149104663 scopus 로고    scopus 로고
    • Cooperation of intelligent honeypots to detect unknown malicious codes, WISTDCS 2008, IEEE CS Press
    • Song J, Takakura H, Yasuo O. Cooperation of intelligent honeypots to detect unknown malicious codes, WISTDCS 2008, IEEE CS Press, 2008; 31-39.
    • (2008) , pp. 31-39
    • Song, J.1    Takakura, H.2    Yasuo, O.3
  • 26
    • 84908184331 scopus 로고    scopus 로고
    • HoneyTrap,
    • HoneyTrap, http://honeytrap.mwcollect.org/.
  • 27
    • 33646000916 scopus 로고    scopus 로고
    • The internet motion sensor: a distributed blackhole monitoring system
    • Proceedings of the 12th ISOC Symposium on Network and Distributed Systems Security (NDSS), Citeseer
    • Bailey M, Cooke E, Jahanian F, Nazario J, Watson D. The internet motion sensor: a distributed blackhole monitoring system, In Proceedings of the 12th ISOC Symposium on Network and Distributed Systems Security (NDSS), Citeseer, 2005; 167-179.
    • (2005) , pp. 167-179
    • Bailey, M.1    Cooke, E.2    Jahanian, F.3    Nazario, J.4    Watson, D.5
  • 28
  • 29
    • 44049086375 scopus 로고    scopus 로고
    • Practical darknet measurement, In Information Sciences and Systems, 2006 40th Annual Conference, IEEE
    • Bailey M, Cooke E, Jahanian F, Myrick A, Sinha S. Practical darknet measurement, In Information Sciences and Systems, 2006 40th Annual Conference, IEEE, 2007; 1496-1501.
    • (2007) , pp. 1496-1501
    • Bailey, M.1    Cooke, E.2    Jahanian, F.3    Myrick, A.4    Sinha, S.5
  • 30
    • 76249083391 scopus 로고    scopus 로고
    • Practical correlation analysis between scan and malware profiles against zero-day attacks based on darknet monitoring
    • Nakao K, Inoue D, Eto M, Yoshioka K. Practical correlation analysis between scan and malware profiles against zero-day attacks based on darknet monitoring. IEICE Transactions on Information and Systems 2009; 92(5):787-798.
    • (2009) IEICE Transactions on Information and Systems , vol.92 , Issue.5 , pp. 787-798
    • Nakao, K.1    Inoue, D.2    Eto, M.3    Yoshioka, K.4
  • 32
    • 84908176145 scopus 로고    scopus 로고
    • An advanced security monitoring and response framework using darknet traffic, 2012 International Workshop on INFORMATION & SECURITY
    • Choi SS, Kim SH, Park HS. An advanced security monitoring and response framework using darknet traffic, 2012 International Workshop on INFORMATION & SECURITY, 2012; 9-10.
    • (2012) , pp. 9-10
    • Choi, S.S.1    Kim, S.H.2    Park, H.S.3
  • 34
    • 84908184329 scopus 로고    scopus 로고
    • A fusion framework of IDS alerts and darknet traffic for effective incident monitoring and response
    • Choi SS, Kim SH, Park HS. A fusion framework of IDS alerts and darknet traffic for effective incident monitoring and response, Applied Mathematics & Information Sciences 2013.
    • (2013) Applied Mathematics & Information Sciences
    • Choi, S.S.1    Kim, S.H.2    Park, H.S.3
  • 35
    • 84869050088 scopus 로고    scopus 로고
    • A malware collection and Analysis framework based on darknet traffic, ICONIP2012, LNCS
    • Song J, Choi J, Choi S. A malware collection and Analysis framework based on darknet traffic, ICONIP2012, LNCS, 2012; 624-631.
    • (2012) , pp. 624-631
    • Song, J.1    Choi, J.2    Choi, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.