-
1
-
-
84910019277
-
An Advanced Security Monitoring and Response Framework Using Darknet Traffic
-
Tenerife, Spain, 2-5 December
-
Choi, S.; Kim, S.; Park, H. An Advanced Security Monitoring and Response Framework Using Darknet Traffic. In Proceedings of the 2012 International Workshop on Information & Security, Tenerife, Spain, 2-5 December 2012; pp. 9-10.
-
(2012)
Proceedings of the 2012 International Workshop on Information & Security
, pp. 9-10
-
-
Choi, S.1
Kim, S.2
Park, H.3
-
2
-
-
84908220263
-
An Advanced Incident Response Framework Based on Suspicious Traffic
-
Choi, S.; Song, J.; Park, H.; Choi, J. An Advanced Incident Response Framework Based on Suspicious Traffic. J. Future Game Technol. 2012, 2, 171-176.
-
(2012)
J. Future Game Technol
, vol.2
, pp. 171-176
-
-
Choi, S.1
Song, J.2
Park, H.3
Choi, J.4
-
3
-
-
0023294428
-
An intrusion detection model
-
Denning, D.E. An intrusion detection model. IEEE Trans. Softw. Eng. 1987, 2, 222-232.
-
(1987)
IEEE Trans. Softw. Eng
, vol.2
, pp. 222-232
-
-
Denning, D.E.1
-
4
-
-
84933183260
-
CANN: An intrusion detection system based on combining cluster centers and nearest neighbors
-
Lina, W.C.; Keb, S.W.; Tsai, C.F. CANN: An intrusion detection system based on combining cluster centers and nearest neighbors. Knowl.-Based Syst. 2015, 78, 13-21.
-
(2015)
Knowl.-Based Syst
, vol.78
, pp. 13-21
-
-
Lina, W.C.1
Keb, S.W.2
Tsai, C.F.3
-
5
-
-
84894281761
-
A novel hybrid KPCA and SVM with GA model for intrusion detection
-
Kuanga, F.; Xua, W.; Zhang, S. A novel hybrid KPCA and SVM with GA model for intrusion detection. Appl. Soft Comput. 2014, 18, 178-184.
-
(2014)
Appl. Soft Comput
, vol.18
, pp. 178-184
-
-
Kuanga, F.1
Xua, W.2
Zhang, S.3
-
6
-
-
84906542953
-
On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on Intrusion Detection Systems
-
Elhaga, S.; Fernándezb, A.; Bawakidc, A.; Alshomranic, S.; Herrera, F. On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on Intrusion Detection Systems. Expert Syst. Appl. 2015, 42, 193-202.
-
(2015)
Expert Syst. Appl
, vol.42
, pp. 193-202
-
-
Elhaga, S.1
Fernándezb, A.2
Bawakidc, A.3
Alshomranic, S.4
Herrera, F.5
-
7
-
-
84891062279
-
Online Adaboost-Based Parameterized Methods for Dynamic Distributed Network Intrusion Detection
-
Hu, W.; Gao, J.; Wang, Y.; Wu, O.; Maybank, S. Online Adaboost-Based Parameterized Methods for Dynamic Distributed Network Intrusion Detection. IEEE Trans. Cybern. 2014, 44, 66-82.
-
(2014)
IEEE Trans. Cybern
, vol.44
, pp. 66-82
-
-
Hu, W.1
Gao, J.2
Wang, Y.3
Wu, O.4
Maybank, S.5
-
8
-
-
84866732289
-
Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques
-
El-Semary, A.M.; Mostafa, M.G.M. Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques. J. Inf. Process. Syst. 2010, 6, 481-500.
-
(2010)
J. Inf. Process. Syst
, vol.6
, pp. 481-500
-
-
El-Semary, A.M.1
Mostafa, M.G.M.2
-
9
-
-
84925357429
-
Robust Real-Time Intrusion Detection System
-
Kim, B.J.; Kim, I.K. Robust Real-Time Intrusion Detection System. J. Inf. Process. Syst. 2005, 1, 9-13.
-
(2005)
J. Inf. Process. Syst
, vol.1
, pp. 9-13
-
-
Kim, B.J.1
Kim, I.K.2
-
10
-
-
84856665180
-
Intrusion Detection based on Traffic Analysis and Fuzzy Inference System in Wireless Sensor Networks
-
Ponomarchuk, Y.; Seo, D. Intrusion Detection based on Traffic Analysis and Fuzzy Inference System in Wireless Sensor Networks. J. Converg. 2010, 1, 35-42.
-
(2010)
J. Converg
, vol.1
, pp. 35-42
-
-
Ponomarchuk, Y.1
Seo, D.2
-
11
-
-
84919672677
-
ColShield: An effective and collaborative protection shield for the detection and prevention of collaborative flooding of DDoS attacks in wireless mesh networks
-
Jingle, I.D.J.; Rajsingh, E.B. ColShield: An effective and collaborative protection shield for the detection and prevention of collaborative flooding of DDoS attacks in wireless mesh networks. Hum.-Centric Comput. Inf. Sci. 2014, 4, 1-19.
-
(2014)
Hum.-Centric Comput. Inf. Sci
, vol.4
, pp. 1-19
-
-
Jingle, I.D.J.1
Rajsingh, E.B.2
-
12
-
-
53849091351
-
A Generalized Feature Extraction Scheme to Detect 0-Day Attacks via IDS Alerts
-
Turku, Finland, 28 July-1 August 2008; The IEEE CS Press: Washington, DC, USA
-
Song, J.; Takakura, H.; Kwon, Y. A Generalized Feature Extraction Scheme to Detect 0-Day Attacks via IDS Alerts. In Proceedings of the International Symposium on Applications and the Internet, Turku, Finland, 28 July-1 August 2008; The IEEE CS Press: Washington, DC, USA, 2008; pp. 51-56.
-
(2008)
Proceedings of the International Symposium on Applications and the Internet
, pp. 51-56
-
-
Song, J.1
Takakura, H.2
Kwon, Y.3
-
13
-
-
84908162673
-
A model of analyzing cyber threats trend and tracing potential attackers based on darknet traffic
-
Choi, S.; Song, J.; Kim, S.; Kim, S. A model of analyzing cyber threats trend and tracing potential attackers based on darknet traffic. Secur. Commun. Netw. 2014, 7, 1612-1621.
-
(2014)
Secur. Commun. Netw
, vol.7
, pp. 1612-1621
-
-
Choi, S.1
Song, J.2
Kim, S.3
Kim, S.4
-
14
-
-
85013416300
-
An In-Depth Analysis Methodology of IDS Alerts for Identifying Potential Cyber Threats on Darknet
-
Applications and Services, Seoul, Korea, 20-22 October
-
Song, J.; Lee, Y.; Choi, J.; Gil, J.; Choi, S. An In-Depth Analysis Methodology of IDS Alerts for Identifying Potential Cyber Threats on Darknet. In Proceedings of the International Conference on Future Information Technology, Applications and Services, Seoul, Korea, 20-22 October 2016; pp. 35-37.
-
(2016)
Proceedings of the International Conference on Future Information Technology
, pp. 35-37
-
-
Song, J.1
Lee, Y.2
Choi, J.3
Gil, J.4
Choi, S.5
-
15
-
-
85013468681
-
-
(accessed on 10 February 2017)
-
TMS (Threat Management System). Available online: http://www.kornicglory.co.kr/default/product/security/solution/tess_tms.php (accessed on 10 February 2017).
-
-
-
-
16
-
-
85013468447
-
-
(accessed on 10 February 2017)
-
SNORT. Available online: https://www.snort.org (accessed on 10 February 2017).
-
-
-
-
17
-
-
76249083391
-
Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring
-
Nakao, K.; Inoue, D.; Eto, M.; Yoshioka, K. Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring. IEICE Trans. Inf. Syst. 2009, 92, 787-798.
-
(2009)
IEICE Trans. Inf. Syst
, vol.92
, pp. 787-798
-
-
Nakao, K.1
Inoue, D.2
Eto, M.3
Yoshioka, K.4
-
18
-
-
79958707632
-
nicter: A Large-Scale Network Incident Analysis System
-
Salzburg, Austria, 10 April 2011; ACM: New York, NY, USA
-
Eto, M.; Inoue, D.; Song, J.; Nakazato, J.; Ohtaka, K.; Nakao, K. nicter: A Large-Scale Network Incident Analysis System. In Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, Salzburg, Austria, 10 April 2011; ACM: New York, NY, USA, 2011; pp. 37-45.
-
(2011)
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security
, pp. 37-45
-
-
Eto, M.1
Inoue, D.2
Song, J.3
Nakazato, J.4
Ohtaka, K.5
Nakao, K.6
-
19
-
-
84951131541
-
A Study on Association Rule Mining of Darknet Big Data
-
Killarney, Ireland, 12-17 July
-
Ban, T.; Eto, M.; Guo, S.; Inoue, D.; Nakao, K.; Huang, R. A Study on Association Rule Mining of Darknet Big Data. In Proceedings of the 2015 International Joint Conference on Neural Networks (IJCNN), Killarney, Ireland, 12-17 July 2015.
-
(2015)
Proceedings of the 2015 International Joint Conference on Neural Networks (IJCNN)
-
-
Ban, T.1
Eto, M.2
Guo, S.3
Inoue, D.4
Nakao, K.5
Huang, R.6
-
20
-
-
85081770459
-
The Internet Motion Sensor: A distributed blackhole monitoring system
-
San Diego, CA, USA, 3-4 February
-
Bailey, M.; Cooke, E.; Jahanian, F.; Nazario, J.; Watson, D. The Internet Motion Sensor: A distributed blackhole monitoring system. In Proceedings of the 12th ISOC Symposium on Network and Distributed Systems Security, San Diego, CA, USA, 3-4 February 2005; pp. 67-179.
-
(2005)
Proceedings of the 12th ISOC Symposium on Network and Distributed Systems Security
, pp. 67-179
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Nazario, J.4
Watson, D.5
-
22
-
-
44049086375
-
Practical darknet measurement
-
Princeton, NJ, USA, 22-24 March
-
Bailey, M.; Cooke, E.; Jahanian, F.; Myrick, A.; Sinha, S. Practical darknet measurement. In Proceedings of the 2006 40th Annual Conference on Information Sciences and Systems, Princeton, NJ, USA, 22-24 March 2006.
-
(2006)
Proceedings of the 2006 40th Annual Conference on Information Sciences and Systems
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Myrick, A.4
Sinha, S.5
-
23
-
-
84928823469
-
Inferring distributed reflection denial of service attacks from darknet
-
Fachkha, C.; Bou-Harb, E.; Debbabi, M. Inferring distributed reflection denial of service attacks from darknet. Comput. Commun. 2015, 62, 59-71.
-
(2015)
Comput. Commun
, vol.62
, pp. 59-71
-
-
Fachkha, C.1
Bou-Harb, E.2
Debbabi, M.3
-
24
-
-
85013423850
-
Analysis of SSH attacks of Darknet using Honeypots
-
Bhanu, S.; Khilari, G.; Kumar, V. Analysis of SSH attacks of Darknet using Honeypots. Int. J. Eng. Dev. Res. 2014, 3, 348-350.
-
(2014)
Int. J. Eng. Dev. Res
, vol.3
, pp. 348-350
-
-
Bhanu, S.1
Khilari, G.2
Kumar, V.3
-
25
-
-
84946688296
-
Detection of DDoS Backscatter Based on Traffic Features of Darknet TCP Packets
-
Wuhan, China, 3-5 September
-
Furutani, N.; Ban, T.; Nakazato, J.; Shimamura, J.; Kitazono, J.; Ozawa, S. Detection of DDoS Backscatter Based on Traffic Features of Darknet TCP Packets. In Proceedings of the 9th Asia Joint Conference on Information Security, Wuhan, China, 3-5 September 2014.
-
(2014)
Proceedings of the 9th Asia Joint Conference on Information Security
-
-
Furutani, N.1
Ban, T.2
Nakazato, J.3
Shimamura, J.4
Kitazono, J.5
Ozawa, S.6
-
26
-
-
84991043181
-
Malicious Events Grouping via Behavior Based Darknet Traffic Flow Analysis
-
Pang, S.; Komosny D.; Zhu, L.; Zhang, R.; Sarrafzadeh, A.; Ban, T.; Inoue, D. Malicious Events Grouping via Behavior Based Darknet Traffic Flow Analysis. Wirel. Pers. Commun. 2016, doi:10.1007/s11277-016-3744-4.
-
(2016)
Wirel. Pers. Commun
-
-
Pang, S.1
Komosny, D.2
Zhu, L.3
Zhang, R.4
Sarrafzadeh, A.5
Ban, T.6
Inoue, D.7
-
28
-
-
85013389817
-
-
(accessed on 10 February 2017)
-
Virustotal. Available online: https://www.virustotal.com (accessed on 10 February 2017).
-
-
-
|