메뉴 건너뛰기




Volumn , Issue , 2014, Pages 305-310

Development of a secure traffic analysis system to trace malicious activities on internal networks

Author keywords

dynamic analysis; malware; sandbox; targeted attack

Indexed keywords

APPLICATION PROGRAMS; COMPUTER CRIME; COMPUTER SOFTWARE; DYNAMIC ANALYSIS; MOBILE SECURITY; NETWORK SECURITY;

EID: 84928631572     PISSN: 07303157     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/COMPSAC.2014.41     Document Type: Conference Paper
Times cited : (6)

References (9)
  • 2
    • 84963952488 scopus 로고    scopus 로고
    • Proposal of a network control system to detect, analyze and mitigate targeted cyber attacks (Internet architecture)
    • H. Hasegawa, Y. Yamaguchi, H. Shimada, and H. Takakura, "Proposal of a network control system to detect, analyze and mitigate targeted cyber attacks (Internet architecture). IEICE technical report, vol. 113, no. 240, pp. 1-6, 2013.
    • (2013) IEICE Technical Report , vol.113 , Issue.240 , pp. 1-6
    • Hasegawa, H.1    Yamaguchi, Y.2    Shimada, H.3    Takakura, H.4
  • 3
    • 84928602652 scopus 로고    scopus 로고
    • A countermeasure recommendation system against targeted attacks with preserving continuity of internal networks
    • in press
    • H. Hasegawa, "A countermeasure recommendation system against targeted attacks with preserving continuity of internal networks. The 38th Annual International Computers, Software and Applications Conference, 2014, in press.
    • (2014) The 38th Annual International Computers, Software and Applications Conference
    • Hasegawa, H.1
  • 4
    • 34047110218 scopus 로고    scopus 로고
    • Toward automated dynamic malware analysis using cwsandbox
    • C. Willems, T. Holz, and F. Freiling, "Toward automated dynamic malware analysis using cwsandbox. Security Privacy, IEEE, vol. 5, no. 2, pp. 32-39, 2007.
    • (2007) Security Privacy IEEE , vol.5 , Issue.2 , pp. 32-39
    • Willems, C.1    Holz, T.2    Freiling, F.3
  • 9
    • 84867976535 scopus 로고    scopus 로고
    • Unknown attacks detection using feature extraction from anomaly-based IDS alerts
    • IEEE/IPSJ 12th International Symposium on 2012
    • M. Sato, H. Yamaki, and H. Takakura, "Unknown attacks detection using feature extraction from anomaly-based IDS alerts. in Applications and the Internet, 2012 IEEE/IPSJ 12th International Symposium on, 2012, pp. 273-277.
    • (2012) Applications and the Internet , pp. 273-277
    • Sato, M.1    Yamaki, H.2    Takakura, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.