-
2
-
-
84869777926
-
-
Springer, Berlin, Heidelberg
-
Jeun I, Lee Y, Won D (2012) A practical study on advanced persistent threats. Computer applications for security, control and system engineering. Springer, Berlin, Heidelberg, pp 144–152
-
(2012)
A Practical Study on Advanced Persistent Threats. Computer Applications for Security, Control and System Engineering
, pp. 144-152
-
-
Jeun, I.1
Lee, Y.2
Won, D.3
-
3
-
-
84919639285
-
MLDS: multi-layer defense system for preventing advanced persistent threats
-
Moon D, Im H, Lee JD, Jong Park H (2014) MLDS: multi-layer defense system for preventing advanced persistent threats. Symmetry 6(4):997–1010
-
(2014)
Symmetry
, vol.6
, Issue.4
, pp. 997-1010
-
-
Moon, D.1
Im, H.2
Lee, J.D.3
Jong, P.H.4
-
4
-
-
80052169144
-
Advanced persistent threats and how to monitor and deter them
-
Tankard C (2011) Advanced persistent threats and how to monitor and deter them. Netw Secur 8:16–19
-
(2011)
Netw Secur
, vol.8
, pp. 16-19
-
-
Tankard, C.1
-
5
-
-
84873369793
-
Targeted cyberattacks: a superset of advanced persistent threats
-
Sood AK, Enbody RJ (2013) Targeted cyberattacks: a superset of advanced persistent threats. IEEE Secur Priv 11(1):54–61
-
(2013)
IEEE Secur Priv
, vol.11
, Issue.1
, pp. 54-61
-
-
Sood, A.K.1
Enbody, R.J.2
-
6
-
-
84908266997
-
Combating advanced persistent threats: from network event correlation to incident detection
-
Friedberg I, Skopik F, Settanni G, Fiedler R (2015) Combating advanced persistent threats: from network event correlation to incident detection. Comput Secur 48:35–57
-
(2015)
Comput Secur
, vol.48
, pp. 35-57
-
-
Friedberg, I.1
Skopik, F.2
Settanni, G.3
Fiedler, R.4
-
7
-
-
84974681302
-
Advanced persistent threat (Apt) beyond the hype
-
Springer, Accessed 11 May 2016
-
Ask M, Bondarenko P, Rekdal JE, Nordbø A, Bloemerus P, Piatkivskyi D (2013) Advanced persistent threat (apt) beyond the hype. Project report in IMT4582 Networn security at Gjovin University College. Springer. https://andynor.net/static/fileupload/434/S2_NetwSec_Advanced_Persistent_Threat.pdf. Accessed 11 May 2016
-
(2013)
Project Report in IMT4582 Networn Security at Gjovin University College
-
-
Ask, M.1
Bondarenko, P.2
Rekdal, J.E.3
Nordbø, A.4
Bloemerus, P.5
Piatkivskyi, D.6
-
10
-
-
84870717848
-
How digital detectives deciphered Stuxnet, the most menacing malware in history
-
Zetter K (2011) How digital detectives deciphered Stuxnet, the most menacing malware in history. Wired Mag 11:1–8
-
(2011)
Wired Mag
, vol.11
, pp. 1-8
-
-
Zetter, K.1
-
11
-
-
78650062267
-
-
Accessed 10 May 2016
-
Falliere N, Murchu L, Chien E (2015) W32.Stuxnet.Dossier. https://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier. Accessed 10 May 2016
-
(2015)
W32.Stuxnet.Dossier
-
-
Falliere, N.1
Murchu, L.2
Chien, E.3
-
17
-
-
85080587527
-
Integrated analysis on case study of steve gibson ddos attack may 4th, 2001: performance of testing tools and in the context of business
-
Bhatti AT (2015) Integrated analysis on case study of steve gibson ddos attack may 4th, 2001: performance of testing tools and in the context of business. Int J Res Comput Appl Robot 3(7):8–12
-
(2015)
Int J Res Comput Appl Robot
, vol.3
, Issue.7
, pp. 8-12
-
-
Bhatti, A.T.1
-
18
-
-
85080570799
-
Detection and analysis of drive-by-download attacks and malicious JavaScript code
-
ACM
-
Cova M, Kruegel C, Vigna G (2012) Detection and analysis of drive-by-download attacks and malicious JavaScript code. In: Proc. 19th Int’l Conf. World Wide Web, ACM
-
(2012)
Proc. 19Th Int’l Conf. World Wide Web
-
-
Cova, M.1
Kruegel, C.2
Vigna, G.3
-
20
-
-
85080627213
-
-
Invincea, Inc, Accessed 20 June
-
Spear-Phishing, watering hole and drive-by attacks: the new normal. Invincea, Inc. https://www.invincea.com/wp-content/uploads/2013/10/Invincea-spear-phishing-watering-holedrive-by-whitepaper-2013.pdf. Accessed 20 June 2016
-
(2016)
Spear-Phishing, Watering Hole and Drive-By Attacks: The New Normal
-
-
-
21
-
-
84960410183
-
A study of agent system model for response to spear-phishing
-
Kim CH, Kim S, Kim JB (2016) A study of agent system model for response to spear-phishing. Int Inf Inst Tokyo Inf 19(1):263
-
(2016)
Int Inf Inst Tokyo Inf
, vol.19
, Issue.1
, pp. 263
-
-
Kim, C.H.1
Kim, S.2
Kim, J.B.3
-
22
-
-
84873342212
-
Into the darkness: Dissecting targeted attacks
-
Accessed 16 July 2016
-
Branco R (2011) Into the darkness: dissecting targeted attacks. Qualys Blog. https://blog.qualys.com/securitylabs/2011/11/30/dissecting-targeted-attacks. Accessed 16 July 2016
-
(2011)
Qualys Blog
-
-
Branco, R.1
-
24
-
-
84873338401
-
Mass meshing injection: Sidename.js (now cssminibar.js) ongoing
-
Accessed 14 June 2016
-
Huang W, Hsiao C, Lin N (2011) Mass meshing injection: Sidename.js (now cssminibar.js) ongoing. Armorize Malware Blog. http://blog.armorize.com/2011/06/mass-meshing-injectionsidenamejs.html. Accessed 14 June 2016
-
(2011)
Armorize Malware Blog
-
-
Huang, W.1
Hsiao, C.2
Lin, N.3
-
25
-
-
84873338401
-
Malvertising on google doubleclick ongoing
-
Accessed 26 July 2016
-
Huang W, Hsiao C, Lin N (2011) Malvertising on google doubleclick ongoing. Armorize Malware Blog. http://blog.armorize.com/2011/08/k985ytvhtm-fake-antivirus-mass.html. Accessed 26 July 2016
-
(2011)
Armorize Malware Blog
-
-
Huang, W.1
Hsiao, C.2
Lin, N.3
-
26
-
-
85080627543
-
Design and Operational Guide to Cope with advanced persistent threats
-
Accessed 25 Apr 2016
-
Information-technology Promotion Agency, Design and Operational Guide to Cope with advanced persistent threats. Japan (IPA) (2011). https://www.ipa.go.jp/security/english/third.html. Accessed 25 Apr 2016
-
Japan (IPA) (2011
-
-
-
29
-
-
84878524483
-
A proxy view of quality of domain name service, poisoning attacks and survival strategies
-
Yuan L, Chen CC, Mohapatra P, Chuah CN, Kant K (2013) A proxy view of quality of domain name service, poisoning attacks and survival strategies. ACM Trans Internet Technol (TOIT) 12(3):9
-
(2013)
ACM Trans Internet Technol (TOIT)
, vol.12
, Issue.3
, pp. 9
-
-
Yuan, L.1
Chen, C.C.2
Mohapatra, P.3
Chuah, C.N.4
Kant, K.5
-
31
-
-
84863590115
-
A security analysis of Amazon’s elastic compute cloud service
-
Applied Computing, ACM
-
Balduzzi et al M (2012) A security analysis of Amazon’s elastic compute cloud service. In: Proc. 27th Ann. ACM Symp. Applied Computing, ACM
-
(2012)
Proc. 27Th Ann. ACM Symp
-
-
Balduzzi, M.1
-
33
-
-
84873371573
-
Exploiting smart-phone USB connectivity for fun and profit
-
Stavrou A, Wang Z (2011) Exploiting smart-phone USB connectivity for fun and profit. In: BlackHat DC Conf
-
(2011)
Blackhat DC Conf
-
-
Stavrou, A.1
Wang, Z.2
-
34
-
-
84873338158
-
Thoughts about trusted computing
-
Rutkowska J (2009) Thoughts about trusted computing. In: EuSecWest Conf
-
(2009)
Eusecwest Conf
-
-
Rutkowska, J.1
-
35
-
-
84894556085
-
k-zero day safety A network security metric for measuring the risk of unknown vulnerabilities
-
Wang L, Jajodia S, Singhal A, Cheng P, Noel S (2014) k-zero day safety A network security metric for measuring the risk of unknown vulnerabilities. IEEE Trans Dependable Secure Comput 11(1):30–44
-
(2014)
IEEE Trans Dependable Secure Comput
, vol.11
, Issue.1
, pp. 30-44
-
-
Wang, L.1
Jajodia, S.2
Singhal, A.3
Cheng, P.4
Noel, S.5
-
37
-
-
85080524335
-
-
Accessed 6 July
-
What is a zero-day vulnerability? http://www.pctools.com/security-news/zero-day-vulnerability/. Accessed 6 July 2016
-
(2016)
-
-
-
38
-
-
85080607823
-
-
Accessed 15 May
-
https://en.wikipedia.org/wiki/Zero-day_(computing). Accessed 15 May 2016
-
(2016)
-
-
-
39
-
-
84964974999
-
Ontology based APT attack behavior analysis in cloud computing
-
(,),. In
-
Choi J, Choi C, Lynn HM, Kim P (2015) Ontology based APT attack behavior analysis in cloud computing. In: 2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA), pp 375–379
-
(2015)
2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)
, pp. 375-379
-
-
Choi, J.1
Choi, C.2
Lynn, H.M.3
Kim, P.4
-
42
-
-
79957616447
-
Stuxnet: dissecting a cyber warfare weapon
-
Langner R (2011) Stuxnet: dissecting a cyber warfare weapon. IEEE Secur Priv 9(3):49–51
-
(2011)
IEEE Secur Priv
, vol.9
, Issue.3
, pp. 49-51
-
-
Langner, R.1
-
44
-
-
84856498738
-
Protecting against spear-phishing
-
Parmar B (2012) Protecting against spear-phishing. Comput Fraud Secur 2012(1):8–11
-
(2012)
Comput Fraud Secur
, vol.2012
, Issue.1
, pp. 8-11
-
-
Parmar, B.1
-
45
-
-
84896486103
-
Going spear phishing: exploring embedded training and awareness
-
Caputo DD, Pfleeger SL, Freeman JD, Johnson ME (2014) Going spear phishing: exploring embedded training and awareness. IEEE Secur Priv 12(1):28–38
-
(2014)
IEEE Secur Priv
, vol.12
, Issue.1
, pp. 28-38
-
-
Caputo, D.D.1
Pfleeger, S.L.2
Freeman, J.D.3
Johnson, M.E.4
-
47
-
-
84894191142
-
The cousins of Stuxnet: Duqu, Flame, and Gauss
-
Bencsáth B, Pék G, Buttyán L, Félegyházi M (2012) The cousins of Stuxnet: Duqu, Flame, and Gauss. Future Internet 4(4):972–1003
-
(2012)
Future Internet
, vol.4
, Issue.4
, pp. 972-1003
-
-
Bencsáth, B.1
Pék, G.2
Buttyán, L.3
Félegyházi, M.4
-
49
-
-
85080493612
-
-
Accessed 10 June
-
http://www.enterpriseitnews.com.my/malaysia-organizations-more-likely-to-be-targeted-with-cyber-attacks-fireeye-report/3.4ref. Accessed 10 June 2016
-
(2016)
-
-
-
50
-
-
85080588045
-
-
Accessed 19 June
-
https://www.fireeye.com/current-threats/annual-threat-report.html3.4ref. Accessed 19 June 2016
-
(2016)
-
-
-
51
-
-
85080604391
-
-
Accessed 10 May
-
http://www.computerweekly.com/news/4500260196/Cyber-attacks-an-increasing-concern-for-Asean-countries. Accessed 10 May 2016
-
(2016)
-
-
-
52
-
-
85080515152
-
-
Accessed 5 July
-
http://www.computerweekly.com/news/4500260196/Cyber-attacks-an-increasing-concern-for-Asean-countries. Accessed 5 July 2016
-
(2016)
-
-
-
53
-
-
80051793908
-
Data preprocessing for anomaly based network intrusion detection: a review
-
Davis J, Clarck A (2011) Data preprocessing for anomaly based network intrusion detection: a review. Comput Secur 30:353–375
-
(2011)
Comput Secur
, vol.30
, pp. 353-375
-
-
Davis, J.1
Clarck, A.2
-
54
-
-
81055146872
-
Reducing false negatives in intelligent intrusion detection decision response system
-
Kai HM, Liu XJ, Liu YF, Zhou L (2011) Reducing false negatives in intelligent intrusion detection decision response system. Appl Mech Mater 128:676–681
-
(2011)
Appl Mech Mater
, vol.128
, pp. 676-681
-
-
Kai, H.M.1
Liu, X.J.2
Liu, Y.F.3
Zhou, L.4
-
55
-
-
77955209381
-
Outside the closed world: On using machine learning for network intrusion detection
-
Oakland
-
Sommer R, Paxson V (2010) Outside the closed world: on using machine learning for network intrusion detection. In: IEEE Symposium on Security and Privacy, Oakland
-
(2010)
IEEE Symposium on Security and Privacy
-
-
Sommer, R.1
Paxson, V.2
-
56
-
-
71749107086
-
A survey of coordinated attacks an collaborative intrusion detection
-
Zhou C, Leckie C, Karunasekera S (2010) A survey of coordinated attacks an collaborative intrusion detection. Comput Secur 29:124–140
-
(2010)
Comput Secur
, vol.29
, pp. 124-140
-
-
Zhou, C.1
Leckie, C.2
Karunasekera, S.3
-
57
-
-
77955469676
-
An overview of IP flow-based intrusion detection
-
Sperotto A, Schaffrath G, Sadre R, Morariu C, Pras A, Stiller B (2010) An overview of IP flow-based intrusion detection. IEEE Commun Surv Tutor 12(3):343–356. doi:10.1109/SURV.2010.032210.00054
-
(2010)
IEEE Commun Surv Tutor
, vol.12
, Issue.3
, pp. 343-356
-
-
Sperotto, A.1
Schaffrath, G.2
Sadre, R.3
Morariu, C.4
Pras, A.5
Stiller, B.6
-
59
-
-
85080568505
-
-
Accessed 29 July
-
Cisco: Cisco IOS NetFlow. http://cisco.com/c/en/us/products/ios-nx-os-software/ios-netflow/index.html. Accessed 29 July 2015
-
(2015)
-
-
-
60
-
-
85080488618
-
-
Accessed 29 July
-
University of California: KDD Cup 1999 Data. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. Accessed 29 July 2015
-
(2015)
-
-
-
62
-
-
85080554532
-
Detection of intrusions and malware, and vulnerability assessment
-
DIMVA Vienna, Austria, July 7–8. Springer, New York
-
Julisch K, Kruegel C (2005) Detection of intrusions and malware, and vulnerability assessment. In: Proceedings of 2nd International Conference, DIMVA Vienna, Austria, July 7–8. Springer, New York
-
(2005)
Proceedings of 2Nd International Conference
-
-
Julisch, K.1
Kruegel, C.2
-
63
-
-
74749087116
-
Ontology-based distributed intrusion detection system
-
IEEE
-
Abdoli F, Kahani, M (2009) Ontology-based distributed intrusion detection system. In: Computer Conference, 2009. CSICC 2009,14th International CSI. IEEE, pp 65–70
-
(2009)
Computer Conference, 2009. CSICC 2009,14Th International CSI
, pp. 65-70
-
-
Abdoli, F.1
Kahani, M.2
-
64
-
-
85080528589
-
-
Accessed 29 July
-
W3C: Semantic web. http://www.w3.org/standards/semanticweb/. Accessed 29 July 2015
-
(2015)
-
-
-
66
-
-
78549259149
-
Ontology-based intelligent system for malware behavioral analysis
-
Huang HD, Chuang TY, Tsai YL, Lee CS (2010) Ontology-based intelligent system for malware behavioral analysis. In: Fuzzy Systems (FUZZ), IEEE International Conference on, pp 1–6
-
(2010)
Fuzzy Systems (FUZZ), IEEE International Conference On
, pp. 1-6
-
-
Huang, H.D.1
Chuang, T.Y.2
Tsai, Y.L.3
Lee, C.S.4
-
67
-
-
85080600016
-
-
W3C: SPARQL 1.1 Overview, Accessed 29 July
-
W3C: SPARQL 1.1 Overview. http://www.w3.org/TR/sparql11-overview/. Accessed 29 July 2015
-
(2015)
-
-
-
70
-
-
27544433210
-
Others: Semantics-aware malware detection
-
Christodorescu M, Jha S, Seshia S, Song D, Bryant RE (2005) others: Semantics-aware malware detection. In: Security and Privacy, IEEE Symposium, pp 32–46
-
(2005)
Security and Privacy, IEEE Symposium
, pp. 32-46
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.3
Song, D.4
Bryant, R.E.5
-
71
-
-
85086420396
-
Syntax vs. semantics: competing approaches to dynamic network intrusion detection
-
Scheirer W, Chuah MC (2008) Syntax vs. semantics: competing approaches to dynamic network intrusion detection. Int J Secure Netw 3(1):24–35
-
(2008)
Int J Secure Netw
, vol.3
, Issue.1
, pp. 24-35
-
-
Scheirer, W.1
Chuah, M.C.2
-
73
-
-
34249753618
-
Support-vector networks
-
Cortes C, Vapnik V (1995) Support-vector networks. Mach Learn 20(3):273–297
-
(1995)
Mach Learn
, vol.20
, Issue.3
, pp. 273-297
-
-
Cortes, C.1
Vapnik, V.2
-
74
-
-
33846274224
-
A framework for detecting network-based code injection attacks targeting Windows and UNIX
-
21st Annual
-
Andersson S, Clark A, Mohay G, Schatz B, Zimmermann J (2005) A framework for detecting network-based code injection attacks targeting Windows and UNIX. In: Computer Security Applications Conference, 21st Annual, p 10
-
(2005)
Computer Security Applications Conference
, pp. 10
-
-
Andersson, S.1
Clark, A.2
Mohay, G.3
Schatz, B.4
Zimmermann, J.5
-
76
-
-
85080541401
-
-
Accessed 10 Jan
-
Cisco: Snort.Org. https://www.snort.org/. Accessed 10 Jan 2015
-
(2015)
Cisco: Snort.Org
-
-
-
83
-
-
14944367082
-
Sketch-based change detection: Methods, evaluation, and applications
-
Krishnamurthy B, Sen S, Zhang Y, Chen Y (2003) Sketch-based change detection: methods, evaluation, and applications. In: Proceedings of the 3rd ACM SIGCOMM Conference on Internet Measurement, pp 234–247
-
(2003)
Proceedings of the 3Rd ACM SIGCOMM Conference on Internet Measurement
, pp. 234-247
-
-
Krishnamurthy, B.1
Sen, S.2
Zhang, Y.3
Chen, Y.4
-
84
-
-
84906968815
-
Context infusion in semantic link networks to detect cyber-attacks: A flow-based detection approach
-
Aleroud A, Karabatis G (2014) Context infusion in semantic link networks to detect cyber-attacks: a flow-based detection approach. IEEE, pp 175–182
-
(2014)
IEEE
, pp. 175-182
-
-
Aleroud, A.1
Karabatis, G.2
-
85
-
-
84885179737
-
Semantic security against web application attacks
-
Razzaq A, Latif K, Ahmad HF, Hur A, Anwar Z, Bloodsworth PC (2014) Semantic security against web application attacks. Inf Sci 254:19–38. doi:10.1016/j.ins.2013.08.007
-
(2014)
Inf Sci
, vol.254
, pp. 19-38
-
-
Razzaq, A.1
Latif, K.2
Ahmad, H.F.3
Hur, A.4
Anwar, Z.5
Bloodsworth, P.C.6
-
86
-
-
84903138908
-
Ontology for attack detection: an intelligent approach to web application security
-
Razzaq A, Anwar Z, Ahmad HF, Latif K, Munir F (2014) Ontology for attack detection: an intelligent approach to web application security. Comput Secur 45:124–146. doi:10.1016/j.cose.05.005
-
(2014)
Comput Secur
, vol.45
, pp. 124-146
-
-
Razzaq, A.1
Anwar, Z.2
Ahmad, H.F.3
Latif, K.4
Munir, F.5
-
87
-
-
1842550305
-
OWL web ontology language overview
-
McGuinness DL, Van HF (2004) OWL web ontology language overview. W3C Recomm 10(10):101
-
(2004)
W3C Recomm
, vol.10
, Issue.10
, pp. 101
-
-
McGuinness, D.L.1
Van, H.F.2
-
88
-
-
35048883095
-
A model for the semantics of attack signatures in misuse detection systems
-
Springer, New York
-
Meier M (2004) A model for the semantics of attack signatures in misuse detection systems. In: Information security. Lecture notes in computer science, vol 3225. Springer, New York, pp 158–169
-
(2004)
Information Security. Lecture Notes in Computer Science
, vol.3225
, pp. 158-169
-
-
Meier, M.1
-
89
-
-
22044458646
-
An overview of OntoClean
-
Springer, New York
-
Guarino N, Welty CA (2009) An overview of OntoClean. In: Handbook on ontologies. Springer, New York, pp 201–220
-
(2009)
Handbook on Ontologies
, pp. 201-220
-
-
Guarino, N.1
Welty, C.A.2
-
90
-
-
70349162348
-
Ontology based application level intrusion detection system by using Bayesian filter
-
Razzaq A, Ahmed HF, Hur A, Haider N (2009) Ontology based application level intrusion detection system by using Bayesian filter. In: Computer Control and Communication, 2009. IC4 2nd International Conference on, pp 1–6
-
(2009)
Computer Control and Communication, 2009. IC4 2Nd International Conference On
, pp. 1-6
-
-
Razzaq, A.1
Ahmed, H.F.2
Hur, A.3
Haider, N.4
-
91
-
-
85006606543
-
Fuzzy aided application layer semantic intrusion detection system—FASIDS
-
Sangeetha S, Vaidehi V (2010) Fuzzy aided application layer semantic intrusion detection system—FASIDS. Int J Netw Secur Appl 2(2):39–56
-
(2010)
Int J Netw Secur Appl
, vol.2
, Issue.2
, pp. 39-56
-
-
Sangeetha, S.1
Vaidehi, V.2
-
92
-
-
85080608589
-
-
Accessed 29 July 2015
-
Farrell JA (2015). http://www.cs.man.ac.uk/~pjj/farrell/comp2.html#EBNF. Accessed 29 July 2015
-
(2015)
-
-
Farrell, J.A.1
-
93
-
-
0022578592
-
Fuzzy cognitive maps
-
Kosko B (1986) Fuzzy cognitive maps. Int J Man Mach Stud 24(1):65–75
-
(1986)
Int J Man Mach Stud
, vol.24
, Issue.1
, pp. 65-75
-
-
Kosko, B.1
-
94
-
-
84884992369
-
Targeted attacks detection with spunge
-
Balduzzi M, Ciangaglini V, McArdle R (2013) Targeted attacks detection with spunge. In: 11th Annual International Conference on Privacy, Security and Trust (PST), 2013, pp 185–194
-
(2013)
11Th Annual International Conference on Privacy, Security and Trust (PST)
, vol.2013
, pp. 185-194
-
-
Balduzzi, M.1
Ciangaglini, V.2
McArdle, R.3
-
95
-
-
0001116877
-
Binary codes capable of correcting deletions, insertions, and reversals
-
Levenshtein VI (1966) Binary codes capable of correcting deletions, insertions, and reversals. Sov Phys Doklady 10:707–710
-
(1966)
Sov Phys Doklady
, vol.10
, pp. 707-710
-
-
Levenshtein, V.I.1
-
96
-
-
81455146798
-
Pattern analysis and signature extraction for intrusion attacks on web services
-
Thakar U, Dagdee N (2010) Pattern analysis and signature extraction for intrusion attacks on web services. Int J Netw Secur Appl 2(3):190–205. doi:10.5121/ijnsa.2010.2313
-
(2010)
Int J Netw Secur Appl
, vol.2
, Issue.3
, pp. 190-205
-
-
Thakar, U.1
Dagdee, N.2
-
98
-
-
84910026904
-
Automated generation of models for fast and precise detection of HTTP based malware
-
Zarras A, Papadogiannakis A, Gawlik R, Holz T (2014) Automated generation of models for fast and precise detection of HTTP based malware. In: 12th Annual International Conference on. Privacy, Security and Trust (PST), pp 249–256
-
(2014)
12Th Annual International Conference On. Privacy, Security and Trust (PST)
, pp. 249-256
-
-
Zarras, A.1
Papadogiannakis, A.2
Gawlik, R.3
Holz, T.4
-
100
-
-
34250739801
-
Vanguard: A new detection scheme for a class of TCP-targeted denial-of-service attacks
-
NOMS, 10th IEEE/IFIP
-
Luo X, Chan EW, Chang RK (2006) Vanguard: a new detection scheme for a class of TCP-targeted denial-of-service attacks. In: Network Operations and Management Symposium, NOMS, 10th IEEE/IFIP, pp 507–518
-
(2006)
Network Operations and Management Symposium
, pp. 507-518
-
-
Luo, X.1
Chan, E.W.2
Chang, R.K.3
-
103
-
-
85080582891
-
-
Accessed 22 Sept
-
MITRE Corporation: CVE-Common Vulnerabilities and Exposures (CVE). https://cve.mitre.org/. Accessed 22 Sept 2015
-
(2015)
-
-
-
107
-
-
84858392040
-
A survey on automated dynamic malware-analysis techniques and tools
-
Egele M, Scholte T, Kirda E, Kruegel C (2012) A survey on automated dynamic malware-analysis techniques and tools. ACM Comput Surv (CSUR) 44(2):6
-
(2012)
ACM Comput Surv (CSUR)
, vol.44
, Issue.2
, pp. 6
-
-
Egele, M.1
Scholte, T.2
Kirda, E.3
Kruegel, C.4
-
109
-
-
85123294947
-
A Survey of Visualization Systems for Malware Analysis
-
Wagner M, Fischer F, Luh R, Haberson A, Rind A, Keim D, Aigner W, Borgo R, Ganovelli F, Viola I (2015) A Survey of Visualization Systems for Malware Analysis. In: EG Conference on Visualization (EuroVis)-STARs, pp 105–125
-
(2015)
EG Conference on Visualization (Eurovis)-Stars
, pp. 105-125
-
-
Wagner, M.1
Fischer, F.2
Luh, R.3
Haberson, A.4
Rind, A.5
Keim, D.6
Aigner, W.7
Borgo, R.8
Ganovelli, F.9
Viola, I.10
-
112
-
-
34249865012
-
Research on intrusion detection and response: a survey
-
Peyman K, Ali AG (2005) Research on intrusion detection and response: a survey. IJ Netw Secur 1(2):84–102
-
(2005)
IJ Netw Secur
, vol.1
, Issue.2
, pp. 84-102
-
-
Peyman, K.1
Ali, A.G.2
-
114
-
-
0028514027
-
A taxonomy of computer program security flaws
-
Landwehr CE, Bull AR, McDermott JP, Choi WS (1994) A taxonomy of computer program security flaws. ACM Comput Surv (CSUR) 26(3):211–254
-
(1994)
ACM Comput Surv (CSUR)
, vol.26
, Issue.3
, pp. 211-254
-
-
Landwehr, C.E.1
Bull, A.R.2
McDermott, J.P.3
Choi, W.S.4
-
116
-
-
0001825730
-
Methontology: From ontological art towards ontological engineering
-
American Association for Artificial Intelligence
-
FernándezL M, Gómez-Pérez A, Juristo N (1997) Methontology: from ontological art towards ontological engineering. In: AAAI Symposium on Ontological Engineering, American Association for Artificial Intelligence
-
(1997)
AAAI Symposium on Ontological Engineering
-
-
Fernándezl, M.1
Gómez-Pérez, A.2
Juristo, N.3
-
117
-
-
33745725639
-
Enabling attack behavior prediction in ubiquitous environments
-
Anagnostopoulos T, Anagnostopoulos C, Hadjiefthymiades S (2005) Enabling attack behavior prediction in ubiquitous environments. In: Pervasive Services, 2005. ICPS’05, Proceedings of International Conference on, pp 425–428
-
(2005)
Pervasive Services, 2005. ICPS’05, Proceedings of International Conference On
, pp. 425-428
-
-
Anagnostopoulos, T.1
Anagnostopoulos, C.2
Hadjiefthymiades, S.3
-
118
-
-
20544433820
-
Extracting attack knowledge using principal-subordinate consequence tagging case grammar and alerts semantic networks
-
Yan W, Hou E, Ansari N (2004) Extracting attack knowledge using principal-subordinate consequence tagging case grammar and alerts semantic networks. In: Local Computer Networks, 29th Annual IEEE International Conference on, pp 110–100
-
(2004)
Local Computer Networks, 29Th Annual IEEE International Conference On
, pp. 110-100
-
-
Yan, W.1
Hou, E.2
Ansari, N.3
-
122
-
-
84862190056
-
A language driven intrusion detection system for event and alert correlation
-
Kluwer Academic, Toulouse, Springer, New York
-
Totel E, Vivinis B, Mé L (2004) A language driven intrusion detection system for event and alert correlation. In: Proceedings at the 19th IFIP International Information Security Conference. Kluwer Academic, Toulouse, Springer, New York, pp 209–224
-
(2004)
Proceedings at the 19Th IFIP International Information Security Conference
, pp. 209-224
-
-
Totel, E.1
Vivinis, B.2
Mé, L.3
-
124
-
-
3042646967
-
Multi-agent technologies for computer network security: attack simulation, intrusion detection and intrusion detection learning
-
Gorodetski V, Kotenko I, Karsaev O (2003) Multi-agent technologies for computer network security: attack simulation, intrusion detection and intrusion detection learning. Comput Syst Sci Eng 18(4):191–200
-
(2003)
Comput Syst Sci Eng
, vol.18
, Issue.4
, pp. 191-200
-
-
Gorodetski, V.1
Kotenko, I.2
Karsaev, O.3
-
126
-
-
84905692209
-
Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains
-
Hutchins EM, Cloppert MJ, Amin RM (2011) Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. Lead Issues Inf Warfare Secur Res 1:80
-
(2011)
Lead Issues Inf Warfare Secur Res
, vol.1
, pp. 80
-
-
Hutchins, E.M.1
Cloppert, M.J.2
Amin, R.M.3
-
127
-
-
79951657380
-
Situation awareness of multistage cyber attacks by semantic event fusion
-
Mathew S, Upadhyaya S, Sudit M, Stotz A (2010) Situation awareness of multistage cyber attacks by semantic event fusion. In: Military Communications Conference, 2010-MILCOM 2010. IEEE, pp 1286–1291
-
(2010)
Military Communications Conference, 2010-MILCOM 2010. IEEE
, pp. 1286-1291
-
-
Mathew, S.1
Upadhyaya, S.2
Sudit, M.3
Stotz, A.4
-
128
-
-
50149111119
-
Information fusion engine for real-time decision-making (INFERD): A perceptual system for cyber attack tracking
-
Stotz A, Sudit M (2007) Information fusion engine for real-time decision-making (INFERD): a perceptual system for cyber attack tracking. In: Information Fusion, 2007 10th International Conference on, pp 1–8
-
(2007)
Information Fusion, 2007 10Th International Conference On
, pp. 1-8
-
-
Stotz, A.1
Sudit, M.2
-
129
-
-
34547299999
-
Understanding multistage attacks by attack-track based visualization of heterogeneous event streams
-
Mathew S, Giomundo R, Upadhyaya S, Sudit M, Stotz A (2006) Understanding multistage attacks by attack-track based visualization of heterogeneous event streams. In: Proceedings of the 3rd International Workshop on Visualization for Computer Security, pp 1–6
-
(2006)
Proceedings of the 3Rd International Workshop on Visualization for Computer Security
, pp. 1-6
-
-
Mathew, S.1
Giomundo, R.2
Upadhyaya, S.3
Sudit, M.4
Stotz, A.5
-
130
-
-
85080500516
-
-
Accessed 29 July
-
GlobalSecurity.org: Open Source Information System (OSIS). http://www.globalsecurity.org/intell/systems/ osis.htm. Accessed 29 July 2015
-
(2015)
Open Source Information System (OSIS
-
-
-
131
-
-
84912524617
-
Federated access to cyber observables for detection of targeted attacks
-
Atighetchi M, Griffith J, Emmons I, Mankins D, Guidorizzi R (2014) Federated access to cyber observables for detection of targeted attacks. In: Proceeding of IEEE on Military Communications Conference (MILCOM), IEEE. pp 60–66
-
(2014)
Proceeding of IEEE on Military Communications Conference (MILCOM), IEEE
, pp. 60-66
-
-
Atighetchi, M.1
Griffith, J.2
Emmons, I.3
Mankins, D.4
Guidorizzi, R.5
-
132
-
-
84899419846
-
Semantic-based context-aware alert fusion for distributed Intrusion Detection Systems
-
Sadighian A, Zargar ST, Fernandez JM, Lemay A (2013) Semantic-based context-aware alert fusion for distributed Intrusion Detection Systems. In International Conference on, Risks and Security of Internet and Systems (CRiSIS), pp 1–6
-
(2013)
In International Conference On, Risks and Security of Internet and Systems (Crisis)
, pp. 1-6
-
-
Sadighian, A.1
Zargar, S.T.2
Fernandez, J.M.3
Lemay, A.4
-
133
-
-
70349755520
-
Analyzing malware log data to support security information and event management: Some research results
-
IEEE
-
Gabriel R, Hoppe T, Pastwa A, Sowa S (2009) Analyzing malware log data to support security information and event management: some research results. In: Proceeding of IEEE First International Conference on Advances in Databases, Knowledge, and Data Applications (DBKDA). IEEE, pp 108–113
-
(2009)
Proceeding of IEEE First International Conference on Advances in Databases, Knowledge, and Data Applications (DBKDA)
, pp. 108-113
-
-
Gabriel, R.1
Hoppe, T.2
Pastwa, A.3
Sowa, S.4
-
135
-
-
84891323480
-
S-MAIDS: A semantic model for automated tuning, correlation, and response selection in intrusion detection systems
-
IEEE
-
Strasburg C, Basu S, Wong JS (2013) S-MAIDS: a semantic model for automated tuning, correlation, and response selection in intrusion detection systems, In: Proceeding of IEEE 37th Annual Conference on Computer Softwareand Applications Conference (COMPSAC). IEEE, pp 319–328
-
(2013)
In: Proceeding of IEEE 37Th Annual Conference on Computer Softwareand Applications Conference (COMPSAC)
, pp. 319-328
-
-
Strasburg, C.1
Basu, S.2
Wong, J.S.3
|