Follow
Jungsuk Song
Title
Cited by
Cited by
Year
Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation
J Song, H Takakura, Y Okabe, M Eto, D Inoue, K Nakao
Proceedings of the first workshop on building analysis datasets and …, 2011
4052011
Toward a more practical unsupervised anomaly detection system
J Song, H Takakura, Y Okabe, K Nakao
Information Sciences 231, 4-14, 2013
1222013
Description of kyoto university benchmark data
J Song, H Takakura, Y Okabe
Available at link: http://www. takakura. com/Kyoto_data/BenchmarkData …, 2006
882006
Unsupervised anomaly detection based on clustering and multiple one-class SVM
J Song, H Takakura, Y Okabe, Y Kwon
IEICE transactions on communications 92 (6), 1981-1990, 2009
552009
Cooperation of intelligent honeypots to detect unknown malicious codes
J Song, H Takakura, Y Okabe
2008 WOMBAT Workshop on Information Security Threats Data Collection and …, 2008
532008
A generalized feature extraction scheme to detect 0-day attacks via IDS alerts
J Song, H Takakura, Y Kwon
2008 International Symposium on Applications and the Internet, 55-61, 2008
512008
Nicter: A large-scale network incident analysis system: Case studies for understanding threat landscape
M Eto, D Inoue, J Song, J Nakazato, K Ohtaka, K Nakao
Proceedings of the First Workshop on Building Analysis Datasets and …, 2011
392011
A comprehensive approach to detect unknown attacks via intrusion detection alerts
J Song, H Ohba, H Takakura, Y Okabe, K Ohira, Y Kwon
Annual Asian Computing Science Conference, 247-253, 2007
312007
A clustering method for improving performance of anomaly-based intrusion detection system
J Song, K Ohira, H Takakura, Y Okabe, Y Kwon
IEICE transactions on information and systems 91 (5), 1282-1291, 2008
222008
Correlation analysis between honeypot data and IDS alerts using one-class SVM
J Song, H Takakura, Y Okabe, Y Kwon
Intrusion Detection Systems, 173-192, 2011
212011
A novel malware clustering method using frequency of function call traces in parallel threads
J Nakazato, J Song, M Eto, D Inoue, K Nakao
IEICE transactions on information and systems 94 (11), 2150-2158, 2011
202011
A model of analyzing cyber threats trend and tracing potential attackers based on darknet traffic
S Choi, J Song, S Kim, S Kim
Security and Communication Networks 7 (10), 1612-1621, 2014
182014
An empirical study of spam: Analyzing spam sending systems and malicious web servers
J Song, D Inque, M Eto, HC Kim, K Nakao
2010 10th IEEE/IPSJ International Symposium on Applications and the Internet …, 2010
142010
Practical in-depth analysis of ids alerts for tracing and identifying potential attackers on darknet
J Song, Y Lee, JW Choi, JM Gil, J Han, SS Choi
Sustainability 9 (2), 262, 2017
132017
How to design practical client honeypots based on virtual environment
JH Park, J Choi, JS Song
2016 11th Asia Joint Conference on Information Security (AsiaJCIS), 67-73, 2016
132016
Method and device for automatically verifying security event
S Jungsuk, C Jangwon, S Choi, KIM HeeSeok, C Jiyeon, Y Lee
US Patent 10,721,245, 2020
122020
Description of Kyoto University Benchmark Data. 2006
J Song, H Takakura, Y Okabe
Available at link: http://www. takakura. com/Kyoto_data/BenchmarkData …, 2016
122016
Visualization of security event logs across multiple networks and its application to a CSOC
B Song, J Choi, SS Choi, J Song
Cluster Computing 22 (1), 1861-1872, 2019
112019
Correlation analysis between spamming botnets and malware infected hosts
J Song, J Shimamura, M Eto, D Inoue, K Nakao
2011 IEEE/IPSJ International Symposium on Applications and the Internet, 372-375, 2011
112011
Description of Kyoto university benchmark data
S Jungsuk, H Takakura, Y Okabe
Academic Center for Computing and Media Studies (ACCMS), Kyoto University, 2006
112006
The system can't perform the operation now. Try again later.
Articles 1–20