Cyber scanning: a comprehensive survey

E Bou-Harb, M Debbabi, C Assi - Ieee communications surveys …, 2013 - ieeexplore.ieee.org
Cyber scanning refers to the task of probing enterprise networks or Internet wide services,
searching for vulnerabilities or ways to infiltrate IT assets. This misdemeanor is often the …

Explicitly covariant light-front dynamics and relativistic few-body systems

J Carbonell, B Desplanques, VA Karmanov, JF Mathiot - Physics Reports, 1998 - Elsevier
The wave function of a composite system is defined in relativity on a space–time surface. In
the explicitly covariant light-front dynamics, reviewed in the present article, the wave …

A taxonomy of DDoS attack and DDoS defense mechanisms

J Mirkovic, P Reiher - ACM SIGCOMM Computer Communication …, 2004 - dl.acm.org
Distributed denial-of-service (DDoS) is a rapidly growing problem. The multitude and variety
of both the attacks and the defense approaches is overwhelming. This paper presents two …

[KIRJA][B] Data mining and machine learning in cybersecurity

S Dua, X Du - 2016 - books.google.com
From basic concepts in machine learning and data mining to advanced problems in the
machine learning domain, this book provides a unified reference for specific machine …

Inferring internet denial-of-service activity

D Moore, C Shannon, DJ Brown, GM Voelker… - ACM Transactions on …, 2006 - dl.acm.org
In this article, we seek to address a simple question:“How prevalent are denial-of-service
attacks in the Internet?” Our motivation is to quantitatively understand the nature of the …

Honeypots: Catching the insider threat

L Spitzner - 19th Annual Computer Security Applications …, 2003 - ieeexplore.ieee.org
In the past several years there has been extensive research into honeypot technologies,
primarily for detection and information gathering against external threats. However, little …

Structural analysis of network traffic flows

A Lakhina, K Papagiannaki, M Crovella, C Diot… - Proceedings of the joint …, 2004 - dl.acm.org
Network traffic arises from the superposition of Origin-Destination (OD) flows. Hence, a
thorough understanding of OD flows is essential for modeling network traffic, and for …

Fast portscan detection using sequential hypothesis testing

J Jung, V Paxson, AW Berger… - IEEE Symposium on …, 2004 - ieeexplore.ieee.org
Attackers routinely perform random portscans of IP addresses to find vulnerable servers to
compromise. Network intrusion detection systems (NIDS) attempt to detect such behavior …

Toward credible evaluation of anomaly-based intrusion-detection methods

M Tavallaee, N Stakhanova… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
Since the first introduction of anomaly-based intrusion detection to the research community
in 1987, the field has grown tremendously. A variety of methods and techniques introducing …

An empirical evaluation of entropy-based traffic anomaly detection

G Nychis, V Sekar, DG Andersen, H Kim… - Proceedings of the 8th …, 2008 - dl.acm.org
Entropy-based approaches for anomaly detection are appealing since they provide more
fine-grained insights than traditional traffic volume analysis. While previous work has …