최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기Computers & security, v.46, 2014년, pp.141 - 153
Seo, I. , Lee, H. , Han, S.C.
The botnets are one of the most dangerous species of network-based attack. They cause severe network disruptions through massive coordinated attacks nowadays and the results of this disruption frequently cost enterprises large sums in financial losses. In this paper, we make an in-depth investigatio...
Abdullah 1 2005 Proceedings of the IEEE workshop on Visualization for Computer Security, VizSec'05 Ids rainstorm: visualizing ids alarms
Antonakakis 273 2010 USENIX Security Symposium Building a dynamic reputation system for DNS
Ball 55 2004 Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security (VizSEC/DMSEC) Home-centric visualization of network traffic for security administration
Bilge 2011 NDSS Exposure: finding malicious domains using passive DNS analysis
Annu Rev Neurosci Born 28 157 2005 10.1146/annurev.neuro.26.041002.131052 Structure and function of visual area MT
Brustoloni 1 2009 Communications, 2009. ICC'09. IEEE International Conference on Efficient detection of bots in subscribers' computers
Chiang 10 2007 Proceedings of the 1st Workshop on Hot Topics in Understanding Botnets A case study of the rustock rootkit and spam bot
Comput Secur Choi 28 5 276 2009 10.1016/j.cose.2008.12.003 Fast detection and visualization of network attacks on parallel coordinate
Choi 715 2007 Proceedings of the 7th IEEE International Conference on Computer and Information Technology, 2007. CIT'07 Botnet detection by monitoring group activities in DNS traffic
Colombe 138 2004 Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security Statistical profiling and visualization for detection of malicious insider attacks on computer networks
Conti 45 2004 Proceedings of CCS Workshop on Visualization and Data Mining for Compute Security Passive visual fingerprinting of network attack tools
Dagon vol. 2005 2005 Botnet detection and response
DNS-BH. Malware prevention through domain blocking. http://www.malwaredomains.com.
Erbacher 2004 Proceedings of the IASTED International Conference On Visualization, Imaging, and Image Processing Fusion and summarization of behavior for intrusion detection visualization
Fink 2004 Submitted for consideration at ACM CCS Workshop on Visualization and Data Mining for Computer Security (VizSec/DMSec) Network eye: end-to-end computer security visualization
Fischer 111 2008 Proceedings of the 5th International Workshop on Visualization for Computer Security. VizSec'08 Large-scale network monitoring for visual analysis of attacks
Softw Pract Exp Fruchterman 21 11 1129 1991 10.1002/spe.4380211102 Graph drawing by force-directed placement
Gu 139 2008 Proceedings of the 17th Conference on Security Symposium Botminer: clustering analysis of network traffic for protocol- and structure-independent botnet detection
Gu 12 2007 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium Bothunter: detecting malware infection through IDS-driven dialog correlation
Harel 545 2007 Proceeding of Neural Information Processing Systems. NIPS'09 Graph-based visual saliency
Iliofotou 1 2009 INFOCOM Workshops 2009, IEEE Exploring graph-based network traffic monitoring
IEICE Trans Commun Ishibashi 95 3 794 2012 Extending black domain name list by using co-occurrence relation between DNS queries
Nat Rev Neurosci Itti 2 3 194 2001 10.1038/35058500 Computational modelling of visual attention
IEEE Trans Pattern Anal Mach Intell Itti 20 11 1254 1998 10.1109/34.730558 A model of saliency-based visual attention for rapid scene analysis
Jung 370 2004 Proceedings of the 4th ACM SIGCOMM conference on Internet measurement An empirical study of spam traffic and the use of DNS black lists
Kovacs 2011 Inspecting DNS flow traffic for purposes of botnet detection
Kovacs 2013 Microsoft and financial companies disrupt over 1,400 Citadel botnets
Krasser 42 2005 Proceedings of the 6th IEEE Information Assurance Workshop. IAW'05 Real-time and forensic network data analysis using animated and coordinated visualization
Li 5430 2009 Proceedings of the 2009 IEEE International Conference on Communications Discernibility analysis and accuracy improvement of machine learning algorithms for network intrusion detection
Manasrah 2009 Detecting botnet activities based on abnormal DNS traffic
Mockapetris PV. RFC 1035: domain names-implementation and specification. http://www.ietf.org/rfc/rfc1035.txt.
Science Moran 229 4715 782 1985 10.1126/science.4023713 Selective attention gates visual processing in the extrastriate cortex
Muelder 265 2006 Recent advances in intrusion detection Interactive visualization for network and port scan detection
Vis Res Parkhurst 42 1 107 2002 10.1016/S0042-6989(01)00250-4 Modeling the role of salience in the allocation of overt visual attention
Porras 2009 Proceedings of the 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats A foray into conficker's logic and rendezvous points
Ren 23 2006 Proceedings of the 3rd International Workshop on Visualization for Computer Security Visualizing DNS traffic
J Adv Comput Intell Intell Inform Resko 10 5 2006 10.20965/jaciii.2006.p0761 Visual cortex inspired intelligent contour detection
Samak 1 2008 INFOCOM Workshops 2008, IEEE On the efficiency of using space-filling curves in network traffic representation
Stone-Gross 635 2009 Proceedings of the 16th ACM conference on Computer and Communications Security. CCS'09 Your botnet is my botnet: analysis of a botnet takeover
Suo 87 2008 Visualization for Computer Security A task centered framework for computer security data visualization
Symantec 2010 MessageLabs Intelligience:2010 Annual Security Report
Discret Appl Math Uehara 145 3 479 2005 10.1016/j.dam.2004.06.008 Graph isomorphism completeness for chordal bipartite graphs and strongly chordal graphs
Villamarin-Salomon 476 2008 Proceedings of the 5th IEEE Consumer Communications and Networking Conference. CCNC'08 Identifying botnets using anomaly detection techniques applied to DNS traffic
Villamarin-Salomon 2035 2009 Proceedings of the 2009 ACM symposium on Applied Computing Bayesian bot detection based on DNS traffic similarity
Von Ahn 294 2003 Advances in Cryptology. EUROCRYPT 2003 Captcha: using hard AI problems for security
Williams 44 2008 Visualization for Computer Security Garnet: a graphical attack graph and reachability network evaluation tool
Wyke 2012 Over 9 million PCS infected - zeroaccess botnet uncovered
Yadav 48 2010 Proceedings of the 10th Annual Conference on Internet Measurement Detecting algorithmically generated malicious domain names
해당 논문의 주제분야에서 활용도가 높은 상위 5개 콘텐츠를 보여줍니다.
더보기 버튼을 클릭하시면 더 많은 관련자료를 살펴볼 수 있습니다.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.