Dark-TRACER: Early Detection Framework for Malware Activity Based on Anomalous Spatiotemporal Patterns

C Han, J Takeuchi, T Takahashi, D Inoue - IEEE Access, 2022 - ieeexplore.ieee.org
As cyberattacks become increasingly prevalent globally, there is a need to identify trends in
these cyberattacks and take suitable countermeasures quickly. The darknet, an unused IP …

FINISH: Efficient and Scalable NMF-Based Federated Learning for Detecting Malware Activities

YW Chang, HY Chen, C Han… - … on Emerging Topics …, 2023 - ieeexplore.ieee.org
5G networks with the vast number of devices pose security threats. Manual analysis of such
extensive security data is complex. Dark-NMF can detect malware activities by monitoring …

Internet-wide scanner fingerprint identifier based on TCP/IP header

A Tanaka, C Han, T Takahashi… - 2021 Sixth International …, 2021 - ieeexplore.ieee.org
Identifying individual scan activities is a crucial and challenging activity for mitigating
emerging cyber threats or gaining insights into security scans. Sophisticated adversaries …

Mitigate: Toward Comprehensive Research and Development for Analyzing and Combating IoT Malware

K Nakao, K Yoshioka, T Sasaki, R Tanabe… - … on Information and …, 2023 - search.ieice.org
In this paper, we developed the latest IoT honeypots to capture IoT malware currently on the
loose, analyzed IoT malware with new features such as persistent infection, developed …

Darknet Analysis-Based Early Detection Framework for Malware Activity: Issue and Potential Extension

C Han, A Tanaka, T Takahashi - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Most packets arriving in the darknet (or network telescope), which is unused IP address
space on the Internet, are related to indiscriminate scanning and attack activities. In recent …

Detecting Coordinated Internet-Wide Scanning by TCP/IP Header Fingerprint

A Tanaka, C Han, T Takahashi - IEEE Access, 2023 - ieeexplore.ieee.org
Adversaries perform port scanning to discover accessible and vulnerable hosts as a prelude
to cyber havoc. A darknet is a cyberattack observation network to capture these scanning …

[PDF][PDF] Towards Long-Term Continuous Tracing of Internet-Wide Scanning Campaigns Based on Darknet Analysis.

C Han, A Tanaka, Jun'ichi Takeuchi, T Takahashi… - ICISSP, 2023 - scitepress.org
The darknet is an unused IP address space that can be an effective resource for observing
and analyzing global indiscriminate scanning attacks. Scanning traffic on the darknet has …

DarkFT: Automatic Scanning Behavior Analysis with FastText in Darknet Traffic

Y Zhao, Z Zhou, J Guo, W Yang, S Li… - 2023 26th International …, 2023 - ieeexplore.ieee.org
Network telescopes (Darknets) collect and record unsolicited Internet-wide traffic destined
for a routed but unused address space, which provides a global perspective on Inter-net …

異常同期性推定に基づくマルウェア活動の早期検知フレームワークの検討

韓燦洙, 竹内純一, 高橋健志… - … シンポジウム2021 論文集, 2021 - ipsj.ixsq.nii.ac.jp
論文抄録 グローバルにサイバー攻撃が蔓延する中, 攻撃傾向を迅速に捉え,
対策を講じることが求められている. マルウェアの感染が拡大する際には, ダークネットに時空間 …

遺伝的アルゴリズムに基づいた広域スキャンのフィンガープリント特定技術の提案

田中智, 韓燦洙, 高橋健志, 藤澤克樹 - … シンポジウム2021 論文集, 2021 - ipsj.ixsq.nii.ac.jp
論文抄録 インターネット上の到達可能かつ未使用の IP アドレス空間 (ダークネット) を利用し,
新興のマルウェア活動を検知することは, 迅速なサイバーセキュリティ対策を行うために必要不可欠 …