2009
DOI: 10.1587/transinf.e92.d.787
|View full text |Cite
|
Sign up to set email alerts
|

Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring

Abstract: SUMMARYConsidering rapid increase of recent highly organized and sophisticated malwares, practical solutions for the countermeasures against malwares especially related to zero-day attacks should be effectively developed in an urgent manner. Several research activities have been already carried out focusing on statistic calculation of network events by means of global network sensors (so-called macroscopic approach) as well as on direct malware analysis such as code analysis (so-called microscopic approach). H… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 31 publications
(18 citation statements)
references
References 8 publications
0
18
0
Order By: Relevance
“…The darknet is being used for studying and developing the countermeasures against malicious activities on the Internet [17][18][19][20][21][22][23][24][25][26][27]. For example, Bailey et al introduced the Internet Motion Sensor (IMS), a globally-scoped Internet monitoring system.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The darknet is being used for studying and developing the countermeasures against malicious activities on the Internet [17][18][19][20][21][22][23][24][25][26][27]. For example, Bailey et al introduced the Internet Motion Sensor (IMS), a globally-scoped Internet monitoring system.…”
Section: Related Workmentioning
confidence: 99%
“…By using the network telescope, in that little or no legitimate traffic exists, they examined its utility and effects for measuring both pandemic incidents (the spread of an Internet worm) and endemic incidents (denial-of-service attacks) on the Internet. Nakao et al introduced a network incident analysis center for tactical emergency response (nicter), which is monitoring around 300,000 unused IP addresses mainly located in Japan [17][18][19]. The main objective of the nicter is to carry out correlation analysis between the network threats observed in the darknet and malware executables captured in the various types of honeypots.…”
Section: Related Workmentioning
confidence: 99%
“…The NICTER Darknet Dataset is a set of packet traces collected from April 1, 2011 using the darknet monitoring system, NICTER [40]. The NICTER covers approximately 240 K unused IP addresses.…”
Section: Nicter Darknet Datasetmentioning
confidence: 99%
“…In phase 2) infection, the historic DARPA Intrusion Detection Data Sets [49] from 1998 to 2000 were released training data and testing data for IDS evaluation with packet traces, audit data, and file system dumps. The hpfriends social data-sharing platform [40] of the Honeynet Project shares the distributed honeypots operated by each contributor. The Contagio [50] shares malware samples relating to APT attacks and their packet traces captured during dynamic analysis.…”
Section: Related Workmentioning
confidence: 99%
“…However, considering the close relationships between global phenomena observed from the macroscopic approach and their root causes analyzed in the microscopic approach, a hybrid approach for such analysis is essential. To this end we have been developing the Network Incident analysis Center for Tactical Emergency Response (nicter) [19]- [21], which incorporates both approaches. The nicter integrates results obtained from both macroscopic and microscopic analysis to obtain useful and practical insight on malware activity.…”
Section: Introductionmentioning
confidence: 99%