Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation J Song, H Takakura, Y Okabe, M Eto, D Inoue, K Nakao Proceedings of the first workshop on building analysis datasets and …, 2011 | 411 | 2011 |
Toward a more practical unsupervised anomaly detection system J Song, H Takakura, Y Okabe, K Nakao Information Sciences 231, 4-14, 2013 | 125 | 2013 |
Description of kyoto university benchmark data J Song, H Takakura, Y Okabe Available at link: http://www. takakura. com/Kyoto_data/BenchmarkData …, 2006 | 88 | 2006 |
Unsupervised anomaly detection based on clustering and multiple one-class SVM J Song, H Takakura, Y Okabe, Y Kwon IEICE transactions on communications 92 (6), 1981-1990, 2009 | 56 | 2009 |
Cooperation of intelligent honeypots to detect unknown malicious codes J Song, H Takakura, Y Okabe 2008 WOMBAT Workshop on Information Security Threats Data Collection and …, 2008 | 53 | 2008 |
A generalized feature extraction scheme to detect 0-day attacks via IDS alerts J Song, H Takakura, Y Kwon 2008 International Symposium on Applications and the Internet, 55-61, 2008 | 51 | 2008 |
Nicter: A large-scale network incident analysis system: Case studies for understanding threat landscape M Eto, D Inoue, J Song, J Nakazato, K Ohtaka, K Nakao Proceedings of the First Workshop on Building Analysis Datasets and …, 2011 | 39 | 2011 |
A comprehensive approach to detect unknown attacks via intrusion detection alerts J Song, H Ohba, H Takakura, Y Okabe, K Ohira, Y Kwon Annual Asian Computing Science Conference, 247-253, 2007 | 32 | 2007 |
A clustering method for improving performance of anomaly-based intrusion detection system J Song, K Ohira, H Takakura, Y Okabe, Y Kwon IEICE transactions on information and systems 91 (5), 1282-1291, 2008 | 23 | 2008 |
Correlation analysis between honeypot data and IDS alerts using one-class SVM J Song, H Takakura, Y Okabe, Y Kwon Intrusion Detection Systems, 173-192, 2011 | 21 | 2011 |
A novel malware clustering method using frequency of function call traces in parallel threads J Nakazato, J Song, M Eto, D Inoue, K Nakao IEICE transactions on information and systems 94 (11), 2150-2158, 2011 | 20 | 2011 |
A model of analyzing cyber threats trend and tracing potential attackers based on darknet traffic S Choi, J Song, S Kim, S Kim Security and Communication Networks 7 (10), 1612-1621, 2014 | 18 | 2014 |
An empirical study of spam: Analyzing spam sending systems and malicious web servers J Song, D Inque, M Eto, HC Kim, K Nakao 2010 10th IEEE/IPSJ International Symposium on Applications and the Internet …, 2010 | 14 | 2010 |
Practical in-depth analysis of ids alerts for tracing and identifying potential attackers on darknet J Song, Y Lee, JW Choi, JM Gil, J Han, SS Choi Sustainability 9 (2), 262, 2017 | 13 | 2017 |
How to design practical client honeypots based on virtual environment JH Park, J Choi, JS Song 2016 11th Asia Joint Conference on Information Security (AsiaJCIS), 67-73, 2016 | 13 | 2016 |
Method and device for automatically verifying security event S Jungsuk, C Jangwon, S Choi, KIM HeeSeok, C Jiyeon, Y Lee US Patent 10,721,245, 2020 | 12 | 2020 |
Description of Kyoto University Benchmark Data. 2006 J Song, H Takakura, Y Okabe Available at link: http://www. takakura. com/Kyoto_data/BenchmarkData …, 2016 | 12 | 2016 |
Visualization of security event logs across multiple networks and its application to a CSOC B Song, J Choi, SS Choi, J Song Cluster Computing 22 (1), 1861-1872, 2019 | 11 | 2019 |
Correlation analysis between spamming botnets and malware infected hosts J Song, J Shimamura, M Eto, D Inoue, K Nakao 2011 IEEE/IPSJ International Symposium on Applications and the Internet, 372-375, 2011 | 11 | 2011 |
Description of Kyoto university benchmark data S Jungsuk, H Takakura, Y Okabe Academic Center for Computing and Media Studies (ACCMS), Kyoto University, 2006 | 11 | 2006 |