Presentation 2012-03-16
A malicious packet visualization in darknet and its application to malware analysis
Naoto SONE, Tatsuya SHORIKI, Akihisa TORII, Taketo MURAO, Masakatu MORII,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) We analyzed malicious IP packets in the darknet with visualization tool for IP packet which we developed. Furthermore we operated 3 honey pot servers that watched upon some IP addresses with DNAT IP forwarding. As a result, a malicious IP packet characteristic depends on IP network locality.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) darknet / honeypot / DNAT / Visualization
Paper # ICSS2011-46
Date of Issue

Conference Information
Committee ICSS
Conference Date 2012/3/9(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information and Communication System Security (ICSS)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) A malicious packet visualization in darknet and its application to malware analysis
Sub Title (in English)
Keyword(1) darknet
Keyword(2) honeypot
Keyword(3) DNAT
Keyword(4) Visualization
1st Author's Name Naoto SONE
1st Author's Affiliation Naruto University of Education()
2nd Author's Name Tatsuya SHORIKI
2nd Author's Affiliation Graduate School of Engineering, Kobe University
3rd Author's Name Akihisa TORII
3rd Author's Affiliation Graduate School of Engineering, Kobe University
4th Author's Name Taketo MURAO
4th Author's Affiliation Faculty of Engineering, Kobe University
5th Author's Name Masakatu MORII
5th Author's Affiliation Graduate School of Engineering, Kobe University
Date 2012-03-16
Paper # ICSS2011-46
Volume (vol) vol.111
Number (no) 495
Page pp.pp.-
#Pages 6
Date of Issue