Presentation | 2010-11-05 Network Topology Analysys for Web Malware Risk Assessment Akira KANAOKA, Masahiko KATOH, Eiji OKAMOTO, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | Risk Condition Reference Model indicated by National Information Security Center (NISC) simulated dynamics of threat behavior patterns using system topology models and threat behavior models, namely, threat tracing. Although threat tracings on the report of NISC was hand-operated, automatic threat tracing is desirable for comprehensive and high accuracy tracing. In this paper, intranet topology analysis for automatic threat tracing of web malware, is achieved. As a result of analysis, we present requirements for detailed network specification. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Web malware / risk assessment |
Paper # | ICSS2010-50 |
Date of Issue |
Conference Information | |
Committee | ICSS |
---|---|
Conference Date | 2010/10/29(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information and Communication System Security (ICSS) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Network Topology Analysys for Web Malware Risk Assessment |
Sub Title (in English) | |
Keyword(1) | Web malware |
Keyword(2) | risk assessment |
1st Author's Name | Akira KANAOKA |
1st Author's Affiliation | () |
2nd Author's Name | Masahiko KATOH |
2nd Author's Affiliation | |
3rd Author's Name | Eiji OKAMOTO |
3rd Author's Affiliation | |
Date | 2010-11-05 |
Paper # | ICSS2010-50 |
Volume (vol) | vol.110 |
Number (no) | 266 |
Page | pp.pp.- |
#Pages | 6 |
Date of Issue |