Cyber scanning: a comprehensive survey
Cyber scanning refers to the task of probing enterprise networks or Internet wide services,
searching for vulnerabilities or ways to infiltrate IT assets. This misdemeanor is often the …
searching for vulnerabilities or ways to infiltrate IT assets. This misdemeanor is often the …
Explicitly covariant light-front dynamics and relativistic few-body systems
J Carbonell, B Desplanques, VA Karmanov, JF Mathiot - Physics Reports, 1998 - Elsevier
The wave function of a composite system is defined in relativity on a space–time surface. In
the explicitly covariant light-front dynamics, reviewed in the present article, the wave …
the explicitly covariant light-front dynamics, reviewed in the present article, the wave …
A taxonomy of DDoS attack and DDoS defense mechanisms
J Mirkovic, P Reiher - ACM SIGCOMM Computer Communication …, 2004 - dl.acm.org
Distributed denial-of-service (DDoS) is a rapidly growing problem. The multitude and variety
of both the attacks and the defense approaches is overwhelming. This paper presents two …
of both the attacks and the defense approaches is overwhelming. This paper presents two …
[KIRJA][B] Data mining and machine learning in cybersecurity
S Dua, X Du - 2016 - books.google.com
From basic concepts in machine learning and data mining to advanced problems in the
machine learning domain, this book provides a unified reference for specific machine …
machine learning domain, this book provides a unified reference for specific machine …
Inferring internet denial-of-service activity
D Moore, C Shannon, DJ Brown, GM Voelker… - ACM Transactions on …, 2006 - dl.acm.org
In this article, we seek to address a simple question:“How prevalent are denial-of-service
attacks in the Internet?” Our motivation is to quantitatively understand the nature of the …
attacks in the Internet?” Our motivation is to quantitatively understand the nature of the …
Honeypots: Catching the insider threat
L Spitzner - 19th Annual Computer Security Applications …, 2003 - ieeexplore.ieee.org
In the past several years there has been extensive research into honeypot technologies,
primarily for detection and information gathering against external threats. However, little …
primarily for detection and information gathering against external threats. However, little …
Structural analysis of network traffic flows
Network traffic arises from the superposition of Origin-Destination (OD) flows. Hence, a
thorough understanding of OD flows is essential for modeling network traffic, and for …
thorough understanding of OD flows is essential for modeling network traffic, and for …
Fast portscan detection using sequential hypothesis testing
Attackers routinely perform random portscans of IP addresses to find vulnerable servers to
compromise. Network intrusion detection systems (NIDS) attempt to detect such behavior …
compromise. Network intrusion detection systems (NIDS) attempt to detect such behavior …
Toward credible evaluation of anomaly-based intrusion-detection methods
Since the first introduction of anomaly-based intrusion detection to the research community
in 1987, the field has grown tremendously. A variety of methods and techniques introducing …
in 1987, the field has grown tremendously. A variety of methods and techniques introducing …
An empirical evaluation of entropy-based traffic anomaly detection
Entropy-based approaches for anomaly detection are appealing since they provide more
fine-grained insights than traditional traffic volume analysis. While previous work has …
fine-grained insights than traditional traffic volume analysis. While previous work has …