nicter: An incident analysis system toward binding network monitoring with malware analysis

D Inoue, M Eto, K Yoshioka, S Baba… - … Data Collection and …, 2008 - ieeexplore.ieee.org
We have been developing the Network Incident analysis Center for Tactical Emergency
Response (nicter), whose present focus is on detecting and identifying propagating …

A study on association rule mining of darknet big data

T Ban, M Eto, S Guo, D Inoue, K Nakao… - … Joint Conference on …, 2015 - ieeexplore.ieee.org
Global darknet monitoring provides an effective way to observe cyber-attacks that are
significantly threatening network security and management. In this paper, we present a study …

Automated malware analysis system and its sandbox for revealing malware's internal and external activities

D Inoue, K Yoshioka, M Eto, Y Hoshizawa… - IEICE transactions on …, 2009 - search.ieice.org
Malware has been recognized as one of the major security threats in the Internet. Previous
researches have mainly focused on malware's internal activity in a system. However, it is …

Malware behavior analysis in isolated miniature network for revealing malware's network activity

D Inoue, K Yoshioka, M Eto… - 2008 IEEE …, 2008 - ieeexplore.ieee.org
Malware, such as computer viruses, worms, and bots, has been recognized as one of the
major security threats in the Internet environment, and a large amount of research and …

Practical correlation analysis between scan and malware profiles against zero-day attacks based on darknet monitoring

K Nakao, D Inoue, M Eto, K Yoshioka - IEICE TRANSACTIONS on …, 2009 - search.ieice.org
Considering rapid increase of recent highly organized and sophisticated malwares, practical
solutions for the countermeasures against malwares especially related to zero-day attacks …

Detection of botnet activities through the lens of a large-scale darknet

T Ban, L Zhu, J Shimamura, S Pang, D Inoue… - … , China, November 14 …, 2017 - Springer
The growing cyber-threats from botnets compel us to devise proper countermeasures to
detect infected hosts in an efficient and timely manner. In this paper, botnet-host …

Nicter: A large-scale network incident analysis system: Case studies for understanding threat landscape

M Eto, D Inoue, J Song, J Nakazato, K Ohtaka… - Proceedings of the First …, 2011 - dl.acm.org
We have been developing the Network Incident analysis Center for Tactical Emergency
Response (nicter), whose objective is to detect and identify propagating malwares. The …

An incident analysis system NICTER and its analysis engines based on data mining techniques

D Inoue, K Yoshioka, M Eto, M Yamagata… - Advances in Neuro …, 2009 - Springer
Malwares are spread all over cyberspace and often lead to serious security incidents. To
grasp the present trends of malware activities, there are a number of ongoing network …

A novel malware clustering method using frequency of function call traces in parallel threads

J Nakazato, J Song, M Eto, D Inoue… - IEICE transactions on …, 2011 - search.ieice.org
With the rapid development and proliferation of the Internet, cyber attacks are increasingly
and continually emerging and evolving nowadays. Malware–a generic term for computer …

Behavior analysis of long-term cyber attacks in the darknet

T Ban, L Zhu, J Shimamura, S Pang, D Inoue… - … , ICONIP 2012, Doha …, 2012 - Springer
Darknet monitoring provides us an effective way to countermeasure cyber attacks that pose
a significant threat to network security and management. This paper aims to characterize the …