Slow DoS attacks: definition and categorisation E Cambiaso, G Papaleo, G Chiola, M Aiello International Journal of Trust Management in Computing and Communications 1 …, 2013 | 146 | 2013 |
Taxonomy of slow DoS attacks to web applications E Cambiaso, G Papaleo, M Aiello Recent Trends in Computer Networks and Distributed Systems Security …, 2012 | 92 | 2012 |
DNS tunneling detection through statistical fingerprints of protocol messages and machine learning M Aiello, M Mongelli, G Papaleo International Journal of Communication Systems 28 (14), 1987-2002, 2015 | 79 | 2015 |
An on-line intrusion detection approach to identify low-rate DoS attacks M Aiello, E Cambiaso, M Mongelli, G Papaleo 2014 International Carnahan Conference on Security Technology (ICCST), 1-6, 2014 | 51 | 2014 |
Basic classifiers for DNS tunneling detection M Aiello, M Mongelli, G Papaleo 2013 IEEE Symposium on Computers and Communications (ISCC), 000880-000885, 2013 | 49 | 2013 |
Slowcomm: Design, development and performance evaluation of a new slow DoS attack E Cambiaso, G Papaleo, M Aiello Journal of Information Security and Applications 35, 23-31, 2017 | 48 | 2017 |
A comparative performance evaluation of DNS tunneling tools A Merlo, G Papaleo, S Veneziano, M Aiello Computational Intelligence in Security for Information Systems: 4th …, 2011 | 45 | 2011 |
Are mobile botnets a possible threat? The case of SlowBot Net P Farina, E Cambiaso, G Papaleo, M Aiello Computers & Security 58, 268-283, 2016 | 37 | 2016 |
Designing and modeling the slow next DoS attack E Cambiaso, G Papaleo, G Chiola, M Aiello International Joint Conference: CISIS’15 and ICEUTE’15, 249-259, 2015 | 37 | 2015 |
Profiling DNS tunneling attacks with PCA and mutual information M Aiello, M Mongelli, E Cambiaso, G Papaleo Logic Journal of the IGPL 24 (6), 957-970, 2016 | 34 | 2016 |
Understanding ddos attacks from mobile devices P Farina, E Cambiaso, G Papaleo, M Aiello 2015 3rd International Conference on Future Internet of Things and Cloud …, 2015 | 34 | 2015 |
Performance assessment and analysis of DNS tunneling tools M Aiello, A Merlo, G Papaleo Logic Journal of the IGPL 21 (4), 592-602, 2013 | 33 | 2013 |
A similarity based approach for application DoS attacks detection M Aiello, E Cambiaso, S Scaglione, G Papaleo 2013 IEEE Symposium on Computers and Communications (ISCC), 000430-000435, 2013 | 33 | 2013 |
Detection of DoS attacks through Fourier transform and mutual information M Mongelli, M Aiello, E Cambiaso, G Papaleo 2015 IEEE International Conference on Communications (ICC), 7204-7209, 2015 | 29 | 2015 |
Slowdroid: Turning a smartphone into a mobile attack vector E Cambiaso, G Papaleo, M Aiello 2014 International Conference on Future Internet of Things and Cloud, 405-410, 2014 | 27 | 2014 |
SlowReq: A weapon for cyberwarfare operations. Characteristics, limits, performance, remediations M Aiello, G Papaleo, E Cambiaso International Joint Conference SOCO’13-CISIS’13-ICEUTE’13: Salamanca, Spain …, 2014 | 23 | 2014 |
Mobile executions of slow DoS attacks E Cambiaso, G Papaleo, G Chiola, M Aiello Logic Journal of IGPL 24 (1), 54-67, 2016 | 22 | 2016 |
Supervised learning approaches with majority voting for dns tunneling detection M Aiello, M Mongelli, G Papaleo International Joint Conference SOCO’14-CISIS’14-ICEUTE’14: Bilbao, Spain …, 2014 | 22 | 2014 |
Feature transformation and Mutual Information for DNS tunneling analysis E Cambiaso, M Aiello, M Mongelli, G Papaleo 2016 Eighth International Conference on Ubiquitous and Future Networks …, 2016 | 19 | 2016 |
A network traffic representation model for detecting application layer attacks E Cambiaso, G Papaleo, G Chiola, M Aiello International Journal of Computing and Digital Systems 5 (01), 2016 | 19 | 2016 |