Deep mining port scans from darknet

作者: Sofiane Lagraa , Yutian Chen , Jérôme François

DOI: 10.1002/NEM.2065

关键词:

摘要: … and data mining techniques. Third, we provide an interactive visualization for the group of scanned ports … We develop key-value data model based on packet attributes. The key-value …

参考文章(21)
Peng Ning, Barry Peddycord, Sushil Jajodia, On the accurate identification of network service dependencies in distributed systems usenix large installation systems administration conference. pp. 181- 194 ,(2012) , 10.5555/2432523.2432538
Christian Rossow, Amplification Hell: Revisiting Network Protocols for DDoS Abuse network and distributed system security symposium. ,(2014) , 10.14722/NDSS.2014.23233
Takeaki Uno, Masashi Kiyomi, Hiroki Arimura, LCM ver.3 Proceedings of the 1st international workshop on open source data mining frequent pattern mining implementations - OSDM '05. pp. 77- 86 ,(2005) , 10.1145/1133905.1133916
Jian-Guang Lou, Qiang Fu, Yi Wang, Jiang Li, Mining dependency in distributed systems through unstructured logs analysis ACM SIGOPS Operating Systems Review. ,vol. 44, pp. 91- 96 ,(2010) , 10.1145/1740390.1740411
Alberto Dainotti, Alistair King, Kimberly Claffy, Analysis of internet-wide probing using darknets Proceedings of the 2012 ACM Workshop on Building analysis datasets and gathering experience returns for security - BADGERS '12. pp. 13- 14 ,(2012) , 10.1145/2382416.2382423
Gerard Salton, Edward A. Fox, Harry Wu, Extended Boolean information retrieval Communications of the ACM. ,vol. 26, pp. 1022- 1036 ,(1983) , 10.1145/182.358466
Jean-Pierre van Riel, Barry Irwin, InetVis, a visual tool for network telescope traffic analysis Proceedings of the 4th international conference on Computer graphics, virtual reality, visualisation and interaction in Africa - Afrigaph '06. pp. 85- 89 ,(2006) , 10.1145/1108590.1108604
M. E. J. Newman, M. Girvan, Finding and evaluating community structure in networks. Physical Review E. ,vol. 69, pp. 026113- 026113 ,(2004) , 10.1103/PHYSREVE.69.026113
Alberto Dainotti, Alistair King, kc Claffy, Ferdinando Papale, Antonio Pescapè, Analysis of a "/0" stealth scan from a botnet internet measurement conference. pp. 1- 14 ,(2012) , 10.1145/2398776.2398778
Shuying Wang, Miriam A.M. Capretz, A Dependency Impact Analysis Model for Web Services Evolution international conference on web services. pp. 359- 365 ,(2009) , 10.1109/ICWS.2009.62