메뉴 건너뛰기




Volumn 6, Issue 4, 2014, Pages 997-1010

MLDS: Multi-layer defense system for preventing advanced persistent threats

Author keywords

APT attack; Defense in depth; Intrusion detection; Multi layer defense

Indexed keywords


EID: 84919639285     PISSN: None     EISSN: 20738994     Source Type: Journal    
DOI: 10.3390/sym6040997     Document Type: Article
Times cited : (35)

References (22)
  • 1
    • 84897913321 scopus 로고    scopus 로고
    • A survey of emerging threats in cybersecurity
    • Julian, J.-J.; Nepal, S. A survey of emerging threats in cybersecurity. J. Comput. Syst. Sci. 2014, 80, 973-993.
    • (2014) J. Comput. Syst. Sci , vol.80 , pp. 973-993
    • Julian, J.-J.1    Nepal, S.2
  • 2
    • 84919672677 scopus 로고    scopus 로고
    • ColShield: An effective and collaborative protection shield for the detection and prevention of collaborative flooding of DDoS attacks in wireless mesh networks
    • Jingle, I.D.J.; Rajsingh, E.B. ColShield: An effective and collaborative protection shield for the detection and prevention of collaborative flooding of DDoS attacks in wireless mesh networks. Hum.-Centric Comput. Inf. Sci. 2014, 8, doi:10.1186/s13673-014-0008-8.
    • (2014) Hum.-Centric Comput. Inf. Sci , vol.8
    • Jingle, I.D.J.1    Rajsingh, E.B.2
  • 3
    • 84881544095 scopus 로고    scopus 로고
    • Dynamical analysis and control strategies on malware propagation model
    • Feng, L.; Liao, X.; Han, Q.; Li, H. Dynamical analysis and control strategies on malware propagation model. Appl. Math. Model. 2013, 37, 8225-8236.
    • (2013) Appl. Math. Model , vol.37 , pp. 8225-8236
    • Feng, L.1    Liao, X.2    Han, Q.3    Li, H.4
  • 4
    • 84882991772 scopus 로고    scopus 로고
    • Adaptive cross-device gait recognition using a mobile accelerometer
    • Hoang, T.; Nguyen, T.; Luong, C.; Do, S.; Choi, D. Adaptive cross-device gait recognition using a mobile accelerometer. J. Inf. Process. Syst. 2013, 9, 333-348.
    • (2013) J. Inf. Process. Syst , vol.9 , pp. 333-348
    • Hoang, T.1    Nguyen, T.2    Luong, C.3    Do, S.4    Choi, D.5
  • 5
    • 84891879473 scopus 로고    scopus 로고
    • Capturing the interplay between malware and anti-malware in a computer network
    • Misra, A.K.; Verma, M.; Sharma, A. Capturing the interplay between malware and anti-malware in a computer network. Appl. Math. Comput. 2014, 229, 340-349.
    • (2014) Appl. Math. Comput , vol.229 , pp. 340-349
    • Misra, A.K.1    Verma, M.2    Sharma, A.3
  • 6
    • 84890012703 scopus 로고    scopus 로고
    • An advanced persistent threat in 3G networks: Attacking the home network from roaming networks
    • Xenakis, C.; Ntantogian, C. An advanced persistent threat in 3G networks: Attacking the home network from roaming networks. Comput. Secur. 2014, 40, 84-94.
    • (2014) Comput. Secur , vol.40 , pp. 84-94
    • Xenakis, C.1    Ntantogian, C.2
  • 7
    • 84881445333 scopus 로고    scopus 로고
    • Malicious data leak prevention and purposeful evasion attacks: An approach to Advanced Persistent Threat (APT) management
    • Communications and Photonics Conference (SIECPC), Riyadh, Saudi Arabia, 27-30 April
    • Mustafa, T. Malicious data leak prevention and purposeful evasion attacks: An approach to Advanced Persistent Threat (APT) management. In Proceedings of the Saudi International Electronics, Communications and Photonics Conference (SIECPC), Riyadh, Saudi Arabia, 27-30 April 2013; pp. 1-5.
    • (2013) Proceedings of the Saudi International Electronics , pp. 1-5
    • Mustafa, T.1
  • 8
    • 84880591959 scopus 로고    scopus 로고
    • ENDMal: An anti-obfuscation and collaborative malware detection system using syscall sequences
    • Lu, H.; Wang, X.; Zhao, B.; Wang, F.; Su, J. ENDMal: An anti-obfuscation and collaborative malware detection system using syscall sequences. Math. Comput. Model. 2013, 58, 1140-1154.
    • (2013) Math. Comput. Model , vol.58 , pp. 1140-1154
    • Lu, H.1    Wang, X.2    Zhao, B.3    Wang, F.4    Su, J.5
  • 9
    • 84885665087 scopus 로고    scopus 로고
    • Malware detection by prunng of parallel ensembles using harmony Search
    • Sheen, S.; Anitha, R.; Sirisha, P. Malware detection by prunng of parallel ensembles using harmony Search. Pattern Recognit. Lett. 2013, 34, 1140-1154.
    • (2013) Pattern Recognit. Lett , vol.34 , pp. 1140-1154
    • Sheen, S.1    Anitha, R.2    Sirisha, P.3
  • 11
    • 84873654731 scopus 로고    scopus 로고
    • Homomorphic subspace MAC scheme for secure network coding
    • Liu, G.; Wang, X. Homomorphic subspace MAC scheme for secure network coding. ETRI J. 2013, 35, 173-176.
    • (2013) ETRI J , vol.35 , pp. 173-176
    • Liu, G.1    Wang, X.2
  • 12
    • 84897691229 scopus 로고    scopus 로고
    • A distributed implementation algorithm for physical layer security based on untrusted relay cooperation and artificial noise
    • Li, X.; Wang, X.; Xu, X.; Jin, L. A distributed implementation algorithm for physical layer security based on untrusted relay cooperation and artificial noise. ETRI J. 2014, 36, 183-186.
    • (2014) ETRI J , vol.36 , pp. 183-186
    • Li, X.1    Wang, X.2    Xu, X.3    Jin, L.4
  • 13
    • 84874105145 scopus 로고    scopus 로고
    • Opcode sequences as representation of executables for data-mining-based unknown malware detection
    • Santos, I.; Brezo, F.; Ugarte-Pedrero, X.; Bringas, P.G. Opcode sequences as representation of executables for data-mining-based unknown malware detection. Inf. Sci. 2013, 231, 64-82.
    • (2013) Inf. Sci , vol.231 , pp. 64-82
    • Santos, I.1    Brezo, F.2    Ugarte-Pedrero, X.3    Bringas, P.G.4
  • 14
    • 84907246293 scopus 로고    scopus 로고
    • SmSD:A smart secure deletion scheme for SSDs
    • Qin, Y.; Tong, W.; Liu, J.; Zhu, Z. SmSD:A smart secure deletion scheme for SSDs. J. Converg. 2013, 4, 30-35.
    • (2013) J. Converg , vol.4 , pp. 30-35
    • Qin, Y.1    Tong, W.2    Liu, J.3    Zhu, Z.4
  • 15
    • 84888873413 scopus 로고    scopus 로고
    • Deriving common malware behavior through graph clustering
    • Younghee, P.; Reeves, D.S.; Stamp, M. Deriving common malware behavior through graph clustering. Comput. Secur. 2012, 39, 419-430.
    • (2012) Comput. Secur , vol.39 , pp. 419-430
    • Younghee, P.1    Reeves, D.S.2    Stamp, M.3
  • 16
    • 84893457491 scopus 로고    scopus 로고
    • Analyzing malware by abstracting the frequent itemsets in API call sequences
    • Security and Privacy in Computing and Communications (TrustCom), Victoria, Australia, 16-18 July
    • Yong, Q.; He, J.; Yang, Y.; Ji, L. Analyzing malware by abstracting the frequent itemsets in API call sequences. In Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Victoria, Australia, 16-18 July 2013; pp. 265-270.
    • (2013) Proceedings of the 12th IEEE International Conference on Trust , pp. 265-270
    • Yong, Q.1    He, J.2    Yang, Y.3    Ji, L.4
  • 18
    • 84899704421 scopus 로고    scopus 로고
    • Novel active learning methods for enhanced PC malware detection in windows OS
    • Nissim, N.; Moskovitch, R.; Rokach, L.; Elovici, Y. Novel active learning methods for enhanced PC malware detection in windows OS. Expert Syst. Appl. 2014, 41, 5843-5857.
    • (2014) Expert Syst. Appl , vol.41 , pp. 5843-5857
    • Nissim, N.1    Moskovitch, R.2    Rokach, L.3    Elovici, Y.4
  • 19
    • 84941119796 scopus 로고    scopus 로고
    • Artificial neuro fuzzy logic system for detecting human emotions
    • Malkawi, M.; Murad, O. Artificial neuro fuzzy logic system for detecting human emotions. Hum.-Centric Comput. Inf. Sci. 2013, doi:10.1186/2192-1962-3-3.
    • (2013) Hum.-Centric Comput. Inf. Sci
    • Malkawi, M.1    Murad, O.2
  • 21
    • 84899409344 scopus 로고    scopus 로고
    • Data and infrastructure security auditing in cloud computing environments
    • Rasheed, H. Data and infrastructure security auditing in cloud computing environments. Int. J. Inf. Manag. 2014, 34, 364-368.
    • (2014) Int. J. Inf. Manag , vol.34 , pp. 364-368
    • Rasheed, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.