Countering Advanced Persistent Threats through security intelligence and big data analytics

作者: Mirco Marchetti , Fabio Pierazzi , Alessandro Guido , Michele Colajanni

DOI: 10.1109/CYCON.2016.7529438

关键词:

摘要: … Finally, AUSPEX calculates a CnC compromise indicator ch … that this is the first of three compromise indicators. Other two … int , h2 int , ... , hN int , it is possible that an external CnC is no …

参考文章(33)
Stefano Schiavoni, Federico Maggi, Lorenzo Cavallaro, Stefano Zanero, Phoenix: DGA-Based Botnet Tracking and Intelligence ∗ international conference on detection of intrusions and malware, and vulnerability assessment. pp. 192- 211 ,(2014) , 10.1007/978-3-319-08509-8_11
Inkyung Jeun, Youngsook Lee, Dongho Won, A Practical Study on Advanced Persistent Threats Communications in Computer and Information Science. pp. 144- 152 ,(2012) , 10.1007/978-3-642-35264-5_21
Vinod Yegneswaran, Guofei Gu, Wenke Lee, Martin Fong, Phillip Porras, BotHunter: detecting malware infection through IDS-driven dialog correlation usenix security symposium. pp. 12- ,(2007)
Lee T. Ostrom, Cheryl A. Wilhelmsen, Risk Assessment: Tools, Techniques, and Their Applications ,(2012)
Ieng-Fat Lam, Kuan-Ta Chen, Ling-Jyh Chen, Involuntary Information Leakage in Social Network Services Advances in Information and Computer Security. pp. 167- 183 ,(2008) , 10.1007/978-3-540-89598-5_11
Vern Paxson, Bro: a system for detecting network intruders in real-time Computer Networks. ,vol. 31, pp. 2435- 2463 ,(1999) , 10.1016/S1389-1286(99)00112-7
Shanton Chang, Atif Ahmad, Nurul Nuha Abdul Molok, Information Leakage through Online Social Networking: Opening the Doorway for Advanced Persistence Threats australian information security management conference. ,vol. 19, pp. 38- ,(2010) , 10.4225/75/57B673CF34781
Manuela Montangero, Marco Furini, TRank: Ranking Twitter users according to specific topics consumer communications and networking conference. pp. 767- 772 ,(2015) , 10.1109/CCNC.2015.7158074
Roberto Perdisci, Guofei Gu, Wenke Lee, Junjie Zhang, BotMiner: clustering analysis of network traffic for protocol- and structure-independent botnet detection usenix security symposium. pp. 139- 154 ,(2008)