메뉴 건너뛰기




Volumn 48, Issue , 2015, Pages 35-57

Combating advanced persistent threats: From network event correlation to incident detection

Author keywords

Advanced persistent threat; Anomaly detection; Event correlation; Intrusion detection; Log file analysis; Self learning system model

Indexed keywords

ADVANCED PERSISTENT THREAT; ANOMALY DETECTION; EVENT CORRELATION; LOG-FILE ANALYSIS; SELF LEARNING SYSTEM;

EID: 84908266997     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2014.09.006     Document Type: Article
Times cited : (188)

References (35)
  • 3
    • 33646563519 scopus 로고    scopus 로고
    • Hackers profiled who are they and what are their motivations?
    • R. Barber Hackers profiled who are they and what are their motivations? Comput Fraud Secur 2001 2 2001 14 17
    • (2001) Comput Fraud Secur , vol.2001 , Issue.2 , pp. 14-17
    • Barber, R.1
  • 4
    • 84861990805 scopus 로고    scopus 로고
    • Network anomaly detection: Comparison and real-time issues
    • Springer
    • V. Bartoš, and M. Žádník Network anomaly detection: comparison and real-time issues Dependable networks and services 2012 Springer 118 121
    • (2012) Dependable Networks and Services , pp. 118-121
    • Bartoš, V.1    Žádník, M.2
  • 5
    • 84899421373 scopus 로고    scopus 로고
    • Advanced persistent threats: Minimising the damage
    • R. Brewer Advanced persistent threats: minimising the damage Netw Secur 2014 4 2014 5 9
    • (2014) Netw Secur , vol.2014 , Issue.4 , pp. 5-9
    • Brewer, R.1
  • 6
    • 84872817196 scopus 로고    scopus 로고
    • Spear-phishing: How to spot and mitigate the menace
    • T. Caldwell Spear-phishing: how to spot and mitigate the menace Comput Fraud Secur 2013 1 2013 11 16
    • (2013) Comput Fraud Secur , vol.2013 , Issue.1 , pp. 11-16
    • Caldwell, T.1
  • 8
    • 0023294428 scopus 로고
    • An intrusion-detection model
    • D.E. Denning An intrusion-detection model Softw Eng IEEE Trans 2 1987 222 232
    • (1987) Softw Eng IEEE Trans , vol.2 , pp. 222-232
    • Denning, D.E.1
  • 9
    • 57849130705 scopus 로고    scopus 로고
    • Anomaly-based network intrusion detection: Techniques, systems and challenges
    • P. Garca-Teodoro, J. Daz-Verdejo, G. Maci-Fernndez, and E. Vzquez Anomaly-based network intrusion detection: techniques, systems and challenges Comput Secur 28 12 2009 18 28
    • (2009) Comput Secur , vol.28 , Issue.12 , pp. 18-28
    • Garca-Teodoro, P.1    Daz-Verdejo, J.2    MacI-Fernndez, G.3    Vzquez, E.4
  • 10
    • 4243096135 scopus 로고    scopus 로고
    • The domino effect of password reuse
    • B. Ives, K.R. Walsh, and H. Schneider The domino effect of password reuse Commun ACM 47 4 2004 75 78
    • (2004) Commun ACM , vol.47 , Issue.4 , pp. 75-78
    • Ives, B.1    Walsh, K.R.2    Schneider, H.3
  • 11
    • 84888315965 scopus 로고    scopus 로고
    • A novel hybrid intrusion detection method integrating anomaly detection with misuse detection
    • G. Kim, S. Lee, and S. Kim A novel hybrid intrusion detection method integrating anomaly detection with misuse detection Expert Syst Appl 41 4, Part 2 2014 1690-1700
    • (2014) Expert Syst Appl , vol.41 , Issue.4 , pp. 1690-1700
    • Kim, G.1    Lee, S.2    Kim, S.3
  • 12
    • 33750374206 scopus 로고    scopus 로고
    • A taxonomy and comparison of computer security incidents from the commercial and government sectors
    • M. Kjaerland A taxonomy and comparison of computer security incidents from the commercial and government sectors Comput Secur 25 7 2006 522 538
    • (2006) Comput Secur , vol.25 , Issue.7 , pp. 522-538
    • Kjaerland, M.1
  • 13
    • 84873989630 scopus 로고    scopus 로고
    • The cybercrime ecosystem: Online innovation in the shadows?
    • Future-Oriented Technology Analysis
    • E. Kraemer-Mbula, P. Tang, and H. Rush The cybercrime ecosystem: online innovation in the shadows? Technol Forecast Soc Change 80 3 2013 541 555 Future-Oriented Technology Analysis
    • (2013) Technol Forecast Soc Change , vol.80 , Issue.3 , pp. 541-555
    • Kraemer-Mbula, E.1    Tang, P.2    Rush, H.3
  • 16
    • 84955353419 scopus 로고    scopus 로고
    • McAfee
    • McAfee Labs and McAfee Foundstone Professional Services Protecting your critical assets 2010 McAfee
    • (2010) Protecting Your Critical Assets
  • 17
    • 84901192690 scopus 로고    scopus 로고
    • A survey of intrusion detection techniques for cyber-physical systems
    • 55:1-55:29
    • R. Mitchell, and I.R. Chen A survey of intrusion detection techniques for cyber-physical systems ACM Comput Surv 46 4 2014 55:1-55:29
    • (2014) ACM Comput Surv , vol.46 , Issue.4
    • Mitchell, R.1    Chen, I.R.2
  • 18
    • 84893764188 scopus 로고    scopus 로고
    • The internet of things: Do more devices mean more risks?
    • M. O'Neill The internet of things: do more devices mean more risks? Comput Fraud Secur 2014 1 2014 16 17
    • (2014) Comput Fraud Secur , vol.2014 , Issue.1 , pp. 16-17
    • O'Neill, M.1
  • 19
    • 34250315640 scopus 로고    scopus 로고
    • An overview of anomaly detection techniques: Existing solutions and latest technological trends
    • A. Patcha, and J.M. Park An overview of anomaly detection techniques: existing solutions and latest technological trends Comput Netw 51 12 2007 3448 3470
    • (2007) Comput Netw , vol.51 , Issue.12 , pp. 3448-3470
    • Patcha, A.1    Park, J.M.2
  • 24
    • 77955209381 scopus 로고    scopus 로고
    • Outside the closed world: On using machine learning for network intrusion detection
    • R. Sommer, and V. Paxson Outside the closed world: on using machine learning for network intrusion detection Security and Privacy (SP), 2010 IEEE Symposium on 2010 305 316 10.1109/SP.2010.25
    • (2010) Security and Privacy (SP), 2010 IEEE Symposium on , pp. 305-316
    • Sommer, R.1    Paxson, V.2
  • 25
    • 84876697251 scopus 로고    scopus 로고
    • Crimeware-as-a-servicea survey of commoditized crimeware in the underground market
    • A.K. Sood, and R.J. Enbody Crimeware-as-a-servicea survey of commoditized crimeware in the underground market Int J Crit Infrastructure Prot 6 1 2013 28 38
    • (2013) Int J Crit Infrastructure Prot , vol.6 , Issue.1 , pp. 28-38
    • Sood, A.K.1    Enbody, R.J.2
  • 26
    • 84893737200 scopus 로고    scopus 로고
    • The gaping hole in our security defences
    • J. Steer The gaping hole in our security defences Comput Fraud Secur 2014 1 2014 17 20
    • (2014) Comput Fraud Secur , vol.2014 , Issue.1 , pp. 17-20
    • Steer, J.1
  • 27
    • 80052169144 scopus 로고    scopus 로고
    • Advanced persistent threats and how to monitor and deter them
    • C. Tankard Advanced persistent threats and how to monitor and deter them Netw Secur 2011 8 2011 16 19
    • (2011) Netw Secur , vol.2011 , Issue.8 , pp. 16-19
    • Tankard, C.1
  • 28
    • 81755187694 scopus 로고    scopus 로고
    • Apts: A poorly understood challenge
    • G. Thomson Apts: a poorly understood challenge Netw Secur 2011 11 2011 9 11
    • (2011) Netw Secur , vol.2011 , Issue.11 , pp. 9-11
    • Thomson, G.1
  • 29
    • 0043166339 scopus 로고    scopus 로고
    • Anomaly detection in ip networks
    • M. Thottan, and C. Ji Anomaly detection in ip networks Signal Process IEEE Trans 51 8 2003 2191 2204
    • (2003) Signal Process IEEE Trans , vol.51 , Issue.8 , pp. 2191-2204
    • Thottan, M.1    Ji, C.2
  • 30
    • 84885188079 scopus 로고    scopus 로고
    • From information security to cyber security
    • Cybercrime in the Digital Economy
    • R. von Solms, and J. van Niekerk From information security to cyber security Comput Secur 38 0 2013 97 102 Cybercrime in the Digital Economy
    • (2013) Comput Secur , vol.38 , Issue.0 , pp. 97-102
    • Von Solms, R.1    Van Niekerk, J.2
  • 32
    • 84908269313 scopus 로고    scopus 로고
    • A survey of anomaly intrusion detection techniques
    • Y. Yu A survey of anomaly intrusion detection techniques J Comput Sci Coll 28 1 2012 9 17
    • (2012) J Comput Sci Coll , vol.28 , Issue.1 , pp. 9-17
    • Yu, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.