효율적인 보안관제 수행을 위한 다크넷 트래픽 기반 악성 URL 수집 및 분석방법 연구

논문상세정보
' 효율적인 보안관제 수행을 위한 다크넷 트래픽 기반 악성 URL 수집 및 분석방법 연구' 의 주제별 논문영향력
논문영향력 선정 방법
논문영향력 요약
주제
  • 전자공학
  • darknet
  • maliciousurls
  • security monitoring and response
동일주제 총논문수 논문피인용 총횟수 주제별 논문영향력의 평균
2,317 0

0.0%

' 효율적인 보안관제 수행을 위한 다크넷 트래픽 기반 악성 URL 수집 및 분석방법 연구' 의 참고문헌

  • “A Methodology for Multipurpose DNS Sinkhole Analyzing Double Bounce Emails," Proc. on ICONIP 2013
    Kim, H. LNCS 8226 : 609 ~ 616 [2013]
  • nicter :A Large-Scale Network Incident Analysis System
    Eto, M. Proc. of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security(BADGERS ‘11) : 37 ~ 45 [2011]
  • Toward Automated Dynamic Malware Analysis Using CW Sandbox
    Willenms, C. Journal of IEEE Security and Privacy 5 (2) [2007]
  • The Honeynet Project:trapping the hackers
    Spitzner, L. Magazine of Security & Privacy : 15 ~ 23 [2003]
  • Static malware detection with Segmented Sandboxing
    Qiu, H. Proc. of 8th International Conference on the Malicious and Unwanted Software (MALWARE'13) : 132 ~ 141 [2013]
  • Practical Correlation Analysis Between Scan and Malware Proles Against Zero-day Attacks Based on Darknet Monitoring
    Nakao, K. Journal of IEICE Transactions on Information and System E 92 (5) : 787 ~ 798 [2009]
  • Intrusion detection in Honeynets by compression and hashing
    Abbasi, F., H Proc. of the Telecommunication Networks and Application Conference (ATNAC‘10) : 96 ~ 101 [2010]
  • Gerynets: a definition and evaluation of sparsely populated darknets
    Harrop, W Proc. of the ACM SIGCOMM workshop on Mining network data(MineNet'05) : 171 ~ 172 [2005]
  • Experiences with a Generation III virtual Honeynet
    Abbasi, F., H Proc. of the Telecommunication Networks and Applications Conference(ATNAC‘09) : 1 ~ 6 [2009]
  • Enhanced Sinkhole System by Improving Post-processing Mechanism
    Lee, H. LNCS 6485 : 469 ~ 480 [2010]
  • Defining and Evaluating Greynets(Sparse Darknets)
    Armitage, G. Harrop, W Proc. of the IEEE conference on Local Computer Networks 30th Anniversary(LCN'05) : 344 ~ 350 [2005]
  • Data Reduction for the Scalable Automated Analysis of Distributed Darknet Traffic
    Bailey, M. Proc. of the 5th ACM SIGCOMM conference on Internet Measurement(IMC‘05) : 239 ~ 252 [2005]
  • DNS 싱크홀에 기반한 새로운 악성봇 치료 기법
    김영백 정보보호학회논문지 18 (6) : 107 ~ 114 [2008]
  • A survey on automated dynamic malware-analysis techniques and tools
    Egele, M. Journal of ACM Computing Surveys 44 (2) [2012]
  • A Fusion Framework of IDS Alerts and Darknet Traffic for Effective Incident Monitoring and Response
    Choi, S. Journal of Applied Mathematics & Information Science : 245 ~ 251 [2013]