메뉴 건너뛰기




Volumn , Issue , 2013, Pages

Bridging the data gap: Data related challenges in evaluating large scale collaborative security systems ∗

Author keywords

[No Author keywords available]

Indexed keywords

COLLABORATIVE SECURITIES; COLLABORATIVE SECURITY SYSTEM; COLLABORATIVE SYSTEMS; CYBER SECURITY; DATA SHARING; MULTIPLE CLASS; PARAMETERIZED; SIMULATION TECHNIQUE;

EID: 85084160805     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (8)

References (31)
  • 2
    • 85080601921 scopus 로고    scopus 로고
    • Darpa ids evaluation data set. http://www.ll.mit.edu/mission/communications/cyber/CSTcorpora/ideval/data/.
    • Darpa Ids Evaluation Data Set
  • 3
    • 85080491443 scopus 로고    scopus 로고
    • Dshield.org. http://www.dshield.org/.
  • 5
    • 85080575336 scopus 로고    scopus 로고
    • ISC Research Feed. https://isc.sans.edu/researchfeed. html.
  • 8
    • 85084161642 scopus 로고    scopus 로고
    • Challenges in experimenting with botnet detection systems
    • Adam J Aviv and Andreas Haeberlen. Challenges in experimenting with botnet detection systems. In USENIX 4th CSET Workshop, 2011.
    • (2011) USENIX 4th CSET Workshop
    • Aviv, A.J.1    Haeberlen, A.2
  • 9
    • 33750376598 scopus 로고    scopus 로고
    • The nepenthes platform: An efficient approach to collect malware
    • Springer
    • Paul Baecher, Markus Koetter, Thorsten Holz, Maximillian Dornseif, and Felix Freiling. The nepenthes platform: An efficient approach to collect malware. In RAID’06, pages 165–184. Springer, 2006.
    • (2006) RAID’06 , pp. 165-184
    • Baecher, P.1    Koetter, M.2    Holz, T.3    Dornseif, M.4    Freiling, F.5
  • 11
    • 84857332705 scopus 로고    scopus 로고
    • Cross-domain collaborative anomaly detection: So far yet so close
    • Springer
    • Nathaniel Boggs, Sharath Hiremagalore, Angelos Stavrou, and Salvatore J Stolfo. Cross-domain collaborative anomaly detection: so far yet so close. In RAID’11, pages 142–160. Springer, 2011.
    • (2011) RAID’11 , pp. 142-160
    • Boggs, N.1    Hiremagalore, S.2    Stavrou, A.3    Stolfo, S.J.4
  • 12
    • 77955220391 scopus 로고    scopus 로고
    • Playing devil’s advocate: Inferring sensitive information from anonymized network traces
    • Scott Coull, Charles Wright, Fabian Monrose, Michael Collins, Michael K Reiter, et al. Playing devil’s advocate: Inferring sensitive information from anonymized network traces. In NDSS’07, pages 35–47, 2007.
    • (2007) NDSS’07 , pp. 35-47
    • Coull, S.1    Wright, C.2    Monrose, F.3    Collins, M.4    Reiter, M.K.5
  • 14
    • 85075837457 scopus 로고    scopus 로고
    • BotMiner: Clustering analysis of network traffic for protocol-and structure-independent botnet detection
    • Guofei Gu, Roberto Perdisci, Junjie Zhang, Wenke Lee, et al. Botminer: clustering analysis of network traffic for protocol-and structure-independent botnet detection. In Proceedings of the 17th conference on Security symposium, pages 139–154, 2008.
    • (2008) Proceedings of the 17th Conference on Security Symposium , pp. 139-154
    • Gu, G.1    Perdisci, R.2    Zhang, J.3    Lee, W.4
  • 15
  • 16
    • 85084163246 scopus 로고    scopus 로고
    • Autograph: Toward automated, distributed worm signature detection
    • Hyang-Ah Kim and Brad Karp. Autograph: Toward automated, distributed worm signature detection. In Proceedings of the 13th USENIX Security Symposium, pages 271–286, 2004.
    • (2004) Proceedings of the 13th USENIX Security Symposium , pp. 271-286
    • Kim, H.-A.1    Karp, B.2
  • 21
    • 0033295259 scopus 로고    scopus 로고
    • BrO: A system for detecting network intruders in real-time
    • Vern Paxson. Bro: a system for detecting network intruders in real-time. Computer networks, 31(23):2435–2463, 1999.
    • (1999) Computer Networks , vol.31 , Issue.23 , pp. 2435-2463
    • Paxson, V.1
  • 22
    • 14944377862 scopus 로고    scopus 로고
    • Honeyd-a virtual honeypot daemon
    • Hamburg, Germany
    • Niels Provos. Honeyd-a virtual honeypot daemon. In 10th DFN-CERT Workshop, Hamburg, Germany, volume 2, 2003.
    • (2003) 10th DFN-CERT Workshop , vol.2
    • Provos, N.1
  • 26
    • 4344627335 scopus 로고    scopus 로고
    • The spread of the witty worm
    • Colleen Shannon and David Moore. The spread of the witty worm. Security & Privacy, IEEE, 2(4):46–50, 2004.
    • (2004) Security & Privacy, IEEE , vol.2 , Issue.4 , pp. 46-50
    • Shannon, C.1    Moore, D.2
  • 30
    • 85137546697 scopus 로고    scopus 로고
    • Global intrusion detection in the domino overlay system
    • San Diego, CA, 2004
    • Vinod Yegneswaran, Paul Barford, and Somesh Jha. Global intrusion detection in the domino overlay system. In Proceedings of NDSS, volume 2004. San Diego, CA, 2004.
    • (2004) Proceedings of NDSS
    • Yegneswaran, V.1    Barford, P.2    Jha, S.3
  • 31
    • 85077707798 scopus 로고    scopus 로고
    • Highly predictive blacklisting
    • Jian Zhang, Phillip Porras, and Johannes Ullrich. Highly predictive blacklisting. In USENIX Security, volume 8, pages 107–122, 2008.
    • (2008) USENIX Security , vol.8 , pp. 107-122
    • Zhang, J.1    Porras, P.2    Ullrich, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.