2012
DOI: 10.1016/j.comnet.2012.04.018
|View full text |Cite
|
Sign up to set email alerts
|

An orchestration approach for unwanted Internet traffic identification

Abstract: The fulfillment of this Thesis would not have been possible without the contribution of a large number of persons. The first persons I am deeply indebted to are my wife Livia Soraya and my children"s Gabriel, Bruna and Luísa. While they did not contribute to this Thesis directly, but I would like to thank them for their support and love. I would also like to thank my parents, Clarice and José Ribamar, for their important support. I owe a big thank-you to my Thesis advisor, Djamel Sadok, who offered the opportu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
21
0
2

Year Published

2014
2014
2020
2020

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(23 citation statements)
references
References 89 publications
0
21
0
2
Order By: Relevance
“…Example of IOC can be forensics artifacts, virus signatures, IPs/ domain of botnets, and MD5 hashes of attacks files. Most of the security orchestration platforms have considered threat intelligence as an essential element to identify attack behavior at an early stage [30,49,51]. Security orchestration with Global Threat Intelligence Platform (GTIP) [30] incorporates proactive defense technologies including threat intelligence.…”
Section: Orchestration Unitmentioning
confidence: 99%
See 4 more Smart Citations
“…Example of IOC can be forensics artifacts, virus signatures, IPs/ domain of botnets, and MD5 hashes of attacks files. Most of the security orchestration platforms have considered threat intelligence as an essential element to identify attack behavior at an early stage [30,49,51]. Security orchestration with Global Threat Intelligence Platform (GTIP) [30] incorporates proactive defense technologies including threat intelligence.…”
Section: Orchestration Unitmentioning
confidence: 99%
“…The proposed XX:17 ontology-based event correlation architecture has a correlation module, that works as a reasoner. Feitosa et al [49] proposed a collaborative solution to detect intrusion and anomalies by analyzing the co-creation of events and alerts among different subnetworks. It derives policy decision based on the contextual data it receives from an orchestration engine [49].…”
Section: Orchestration Unitmentioning
confidence: 99%
See 3 more Smart Citations