Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring
スポンサーリンク
概要
- 論文の詳細を見る
- 2009-05-01
著者
-
INOUE Daisuke
National Institute of Information and Communications Technology
-
ETO Masashi
National Institute of Information and Communications Technology
-
NAKAO Koji
National Institute of Information and Communications Technology
-
YOSHIOKA Katsunari
Yokohama National University
-
Yoshioka K
The Graduate School Of Environment And Information Sciences Yokohama National University
-
Inoue Daisuke
National Institute Of Information And Communicarions Technology
-
NAKAO Koji
the National Institute of Information and Communications Technology (NICT)
関連論文
- O-means: An Optimized Clustering Method for Analyzing Spam Based Attacks
- Multi-Pass Malware Sandbox Analysis with Controlled Internet Connection
- 招待講演 nicter: An Incident Analysis System for the Global Internet using Correlation between Network Monitoring and Malware Analysis
- 招待講演 nicter: An Incident Analysis System for the Global Internet using Correlation between Network Monitoring and Malware Analysis
- Fine-Grain Feature Extraction from Malware's Scan Behavior Based on Spectrum Analysis
- Malware Sandbox Analysis for Secure Observation of Vulnerability Exploitation
- Automated Malware Analysis System and Its Sandbox for Revealing Malware's Internal and External Activities
- Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring
- Special Section on Information Theory and Its Applications
- Your Sandbox is Blinded: Impact of Decoy Injection to Public Malware Analysis Systems
- O-means : An Optimized Clustering Method for Analyzing Spam Based Attacks
- A Comparative Study of Unsupervised Anomaly Detection Techniques Using Honeypot Data
- On Collusion Security of Random Codes(Biometrics)(Cryptography and Information Security)
- Collusion Secure Codes : Systematic Security Definitions and Their Relations(Discrete Mathematics and Its Applications)
- Random-Error-Resilient Tracing Algorithm for a Collusion-Secure Fingerprinting Code (特集 電子社会に向けたコンピュータセキュリティ技術)
- P2P Network Traffic Analysis Using Data Mining Engines
- A Novel Malware Clustering Method Using Frequency of Function Call Traces in Parallel Threads
- An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation
- Malware Sandbox Analysis with Efficient Observation of Herder's Behavior
- Malware Sandbox Analysis with Efficient Observation of Herder's Behavior
- Catching the Behavioral Differences between Multiple Executions for Malware Detection
- An Accurate Packer Identification Method Using Support Vector Machine
- Design and Implementation of Security for HIMALIS Architecture of Future Networks
- Towards Cost-Effective P2P Traffic Classification in Cloud Environment
- Catching the Behavioral Differences between Multiple Executions for Malware Detection