메뉴 건너뛰기




Volumn 9, Issue 2, 2017, Pages

Practical in-depth analysis of ids alerts for tracing and identifying potential attackers on darknet

Author keywords

Darknet traffic; IDS alerts; In depth analysis; Potential attackers

Indexed keywords

DATA MANAGEMENT; EXPERIMENTAL STUDY; SOFTWARE; TREND ANALYSIS; WORLD WIDE WEB;

EID: 85013466843     PISSN: None     EISSN: 20711050     Source Type: Journal    
DOI: 10.3390/su9020262     Document Type: Article
Times cited : (9)

References (28)
  • 2
    • 84908220263 scopus 로고    scopus 로고
    • An Advanced Incident Response Framework Based on Suspicious Traffic
    • Choi, S.; Song, J.; Park, H.; Choi, J. An Advanced Incident Response Framework Based on Suspicious Traffic. J. Future Game Technol. 2012, 2, 171-176.
    • (2012) J. Future Game Technol , vol.2 , pp. 171-176
    • Choi, S.1    Song, J.2    Park, H.3    Choi, J.4
  • 3
    • 0023294428 scopus 로고
    • An intrusion detection model
    • Denning, D.E. An intrusion detection model. IEEE Trans. Softw. Eng. 1987, 2, 222-232.
    • (1987) IEEE Trans. Softw. Eng , vol.2 , pp. 222-232
    • Denning, D.E.1
  • 4
    • 84933183260 scopus 로고    scopus 로고
    • CANN: An intrusion detection system based on combining cluster centers and nearest neighbors
    • Lina, W.C.; Keb, S.W.; Tsai, C.F. CANN: An intrusion detection system based on combining cluster centers and nearest neighbors. Knowl.-Based Syst. 2015, 78, 13-21.
    • (2015) Knowl.-Based Syst , vol.78 , pp. 13-21
    • Lina, W.C.1    Keb, S.W.2    Tsai, C.F.3
  • 5
    • 84894281761 scopus 로고    scopus 로고
    • A novel hybrid KPCA and SVM with GA model for intrusion detection
    • Kuanga, F.; Xua, W.; Zhang, S. A novel hybrid KPCA and SVM with GA model for intrusion detection. Appl. Soft Comput. 2014, 18, 178-184.
    • (2014) Appl. Soft Comput , vol.18 , pp. 178-184
    • Kuanga, F.1    Xua, W.2    Zhang, S.3
  • 6
    • 84906542953 scopus 로고    scopus 로고
    • On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on Intrusion Detection Systems
    • Elhaga, S.; Fernándezb, A.; Bawakidc, A.; Alshomranic, S.; Herrera, F. On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on Intrusion Detection Systems. Expert Syst. Appl. 2015, 42, 193-202.
    • (2015) Expert Syst. Appl , vol.42 , pp. 193-202
    • Elhaga, S.1    Fernándezb, A.2    Bawakidc, A.3    Alshomranic, S.4    Herrera, F.5
  • 7
    • 84891062279 scopus 로고    scopus 로고
    • Online Adaboost-Based Parameterized Methods for Dynamic Distributed Network Intrusion Detection
    • Hu, W.; Gao, J.; Wang, Y.; Wu, O.; Maybank, S. Online Adaboost-Based Parameterized Methods for Dynamic Distributed Network Intrusion Detection. IEEE Trans. Cybern. 2014, 44, 66-82.
    • (2014) IEEE Trans. Cybern , vol.44 , pp. 66-82
    • Hu, W.1    Gao, J.2    Wang, Y.3    Wu, O.4    Maybank, S.5
  • 8
    • 84866732289 scopus 로고    scopus 로고
    • Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques
    • El-Semary, A.M.; Mostafa, M.G.M. Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques. J. Inf. Process. Syst. 2010, 6, 481-500.
    • (2010) J. Inf. Process. Syst , vol.6 , pp. 481-500
    • El-Semary, A.M.1    Mostafa, M.G.M.2
  • 9
    • 84925357429 scopus 로고    scopus 로고
    • Robust Real-Time Intrusion Detection System
    • Kim, B.J.; Kim, I.K. Robust Real-Time Intrusion Detection System. J. Inf. Process. Syst. 2005, 1, 9-13.
    • (2005) J. Inf. Process. Syst , vol.1 , pp. 9-13
    • Kim, B.J.1    Kim, I.K.2
  • 10
    • 84856665180 scopus 로고    scopus 로고
    • Intrusion Detection based on Traffic Analysis and Fuzzy Inference System in Wireless Sensor Networks
    • Ponomarchuk, Y.; Seo, D. Intrusion Detection based on Traffic Analysis and Fuzzy Inference System in Wireless Sensor Networks. J. Converg. 2010, 1, 35-42.
    • (2010) J. Converg , vol.1 , pp. 35-42
    • Ponomarchuk, Y.1    Seo, D.2
  • 11
    • 84919672677 scopus 로고    scopus 로고
    • ColShield: An effective and collaborative protection shield for the detection and prevention of collaborative flooding of DDoS attacks in wireless mesh networks
    • Jingle, I.D.J.; Rajsingh, E.B. ColShield: An effective and collaborative protection shield for the detection and prevention of collaborative flooding of DDoS attacks in wireless mesh networks. Hum.-Centric Comput. Inf. Sci. 2014, 4, 1-19.
    • (2014) Hum.-Centric Comput. Inf. Sci , vol.4 , pp. 1-19
    • Jingle, I.D.J.1    Rajsingh, E.B.2
  • 12
    • 53849091351 scopus 로고    scopus 로고
    • A Generalized Feature Extraction Scheme to Detect 0-Day Attacks via IDS Alerts
    • Turku, Finland, 28 July-1 August 2008; The IEEE CS Press: Washington, DC, USA
    • Song, J.; Takakura, H.; Kwon, Y. A Generalized Feature Extraction Scheme to Detect 0-Day Attacks via IDS Alerts. In Proceedings of the International Symposium on Applications and the Internet, Turku, Finland, 28 July-1 August 2008; The IEEE CS Press: Washington, DC, USA, 2008; pp. 51-56.
    • (2008) Proceedings of the International Symposium on Applications and the Internet , pp. 51-56
    • Song, J.1    Takakura, H.2    Kwon, Y.3
  • 13
    • 84908162673 scopus 로고    scopus 로고
    • A model of analyzing cyber threats trend and tracing potential attackers based on darknet traffic
    • Choi, S.; Song, J.; Kim, S.; Kim, S. A model of analyzing cyber threats trend and tracing potential attackers based on darknet traffic. Secur. Commun. Netw. 2014, 7, 1612-1621.
    • (2014) Secur. Commun. Netw , vol.7 , pp. 1612-1621
    • Choi, S.1    Song, J.2    Kim, S.3    Kim, S.4
  • 14
    • 85013416300 scopus 로고    scopus 로고
    • An In-Depth Analysis Methodology of IDS Alerts for Identifying Potential Cyber Threats on Darknet
    • Applications and Services, Seoul, Korea, 20-22 October
    • Song, J.; Lee, Y.; Choi, J.; Gil, J.; Choi, S. An In-Depth Analysis Methodology of IDS Alerts for Identifying Potential Cyber Threats on Darknet. In Proceedings of the International Conference on Future Information Technology, Applications and Services, Seoul, Korea, 20-22 October 2016; pp. 35-37.
    • (2016) Proceedings of the International Conference on Future Information Technology , pp. 35-37
    • Song, J.1    Lee, Y.2    Choi, J.3    Gil, J.4    Choi, S.5
  • 15
    • 85013468681 scopus 로고    scopus 로고
    • (accessed on 10 February 2017)
    • TMS (Threat Management System). Available online: http://www.kornicglory.co.kr/default/product/security/solution/tess_tms.php (accessed on 10 February 2017).
  • 16
    • 85013468447 scopus 로고    scopus 로고
    • (accessed on 10 February 2017)
    • SNORT. Available online: https://www.snort.org (accessed on 10 February 2017).
  • 17
    • 76249083391 scopus 로고    scopus 로고
    • Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring
    • Nakao, K.; Inoue, D.; Eto, M.; Yoshioka, K. Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring. IEICE Trans. Inf. Syst. 2009, 92, 787-798.
    • (2009) IEICE Trans. Inf. Syst , vol.92 , pp. 787-798
    • Nakao, K.1    Inoue, D.2    Eto, M.3    Yoshioka, K.4
  • 23
    • 84928823469 scopus 로고    scopus 로고
    • Inferring distributed reflection denial of service attacks from darknet
    • Fachkha, C.; Bou-Harb, E.; Debbabi, M. Inferring distributed reflection denial of service attacks from darknet. Comput. Commun. 2015, 62, 59-71.
    • (2015) Comput. Commun , vol.62 , pp. 59-71
    • Fachkha, C.1    Bou-Harb, E.2    Debbabi, M.3
  • 24
    • 85013423850 scopus 로고    scopus 로고
    • Analysis of SSH attacks of Darknet using Honeypots
    • Bhanu, S.; Khilari, G.; Kumar, V. Analysis of SSH attacks of Darknet using Honeypots. Int. J. Eng. Dev. Res. 2014, 3, 348-350.
    • (2014) Int. J. Eng. Dev. Res , vol.3 , pp. 348-350
    • Bhanu, S.1    Khilari, G.2    Kumar, V.3
  • 28
    • 85013389817 scopus 로고    scopus 로고
    • (accessed on 10 February 2017)
    • Virustotal. Available online: https://www.virustotal.com (accessed on 10 February 2017).


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.