Art
J-GLOBAL ID:201602209803033076   Reference number:16A0106752

A RAT Detection Method Based on Network Behavior of the Communication’s Early Stage

通信の初期段階のネットワーク挙動に基づいたRAT検出方法
Author (2):
Material:
Volume: E99.A  Issue:Page: 145-153 (J-STAGE)  Publication year: 2016 
JST Material Number: U0466A  ISSN: 1745-1337  Document type: Article
Article type: 原著論文  Country of issue: Japan (JPN)  Language: ENGLISH (EN)
Thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.

Semi thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.

JST classification (2):
JST classification
Category name(code) classified by JST.
Computer networks  ,  Theory of computation 
Reference (14):
  • [1] ISACA, “Data leak prevention,” http://www.isaca.org, 2010.
  • [2] N. Das and T. Sarkar, “Survey on host and network based intrusion detection system,” Int. J. Advanced Networking and Applications, vol.6, no.2, pp.2266-2269, 2014.
  • [3] FireEye, “Network Security NX Series,” https://www.fireeye.com /products/nx-network-security-products.html
  • [4] D. Jiang and K. Omote, “An approach to detect remote access Trojan in the early stage of communication,” 2015 IEEE 29th International Conference on Advanced Information Networking and Applications, pp.706-713, 2015.
  • [5] T. Kocak and I. Kaya, “Low-power bloom filter architecture for deep packet inspection,” IEEE Commun. Lett., vol.10, no.3, pp.210-212, 2006.
more...
Terms in the title (3):
Terms in the title
Keywords automatically extracted from the title.

Return to Previous Page