Darknet as a source of cyber intelligence: Survey, taxonomy, and characterization

C Fachkha, M Debbabi - IEEE Communications Surveys & …, 2015 - ieeexplore.ieee.org
Today, the Internet security community largely emphasizes cyberspace monitoring for the
purpose of generating cyber intelligence. In this paper, we present a survey on darknet. The …

Outside the closed world: On using machine learning for network intrusion detection

R Sommer, V Paxson - 2010 IEEE symposium on security and …, 2010 - ieeexplore.ieee.org
In network intrusion detection research, one popular strategy for finding attacks is monitoring
a network's activity for anomalies: deviations from profiles of normality previously learned …

SANE: A Protection Architecture for Enterprise Networks.

M Casado, T Garfinkel, A Akella, MJ Freedman… - USENIX security …, 2006 - usenix.org
Connectivity in today's enterprise networks is regulated by a combination of complex routing
and bridging policies, along with various interdiction mechanisms such as ACLs, packet …

Understanding the network-level behavior of spammers

A Ramachandran, N Feamster - Proceedings of the 2006 conference on …, 2006 - dl.acm.org
This paper studies the network-level behavior of spammers, including: IP address ranges
that send the most spam, common spamming modes (eg, BGP route hijacking, bots), how …

CloudAV: N-Version Antivirus in the Network Cloud.

J Oberheide, E Cooke, F Jahanian - USENIX Security Symposium, 2008 - usenix.org
Antivirus software is one of the most widely used tools for detecting and stop** malicious
and unwanted files. However, the long term effectiveness of traditional host-based antivirus …

An inside look at botnets

P Barford, V Yegneswaran - Malware detection, 2007 - Springer
The continued growth and diversification of the Internet has been accompanied by an
increasing prevalence of attacks and intrusions [40]. It can be argued, however, that a …

Internet background radiation revisited

E Wustrow, M Karir, M Bailey, F Jahanian… - Proceedings of the 10th …, 2010 - dl.acm.org
The monitoring of packets destined for routeable, yet unused, Internet addresses has proved
to be a useful technique for measuring a variety of specific Internet phenomenon (eg, worms …

binpac: A yacc for writing application protocol parsers

R Pang, V Paxson, R Sommer, L Peterson - Proceedings of the 6th ACM …, 2006 - dl.acm.org
A key step in the semantic analysis of network traffic is to parse the traffic stream according
to the high-level protocols it contains. This process transforms raw bytes into structured …

Map** peering interconnections to a facility

V Giotsas, G Smaragdakis, B Huffaker… - Proceedings of the 11th …, 2015 - dl.acm.org
Annotating Internet interconnections with robust physical coordinates at the level of a
building facilitates network management including interdomain troubleshooting, but also has …

Automating analysis of large-scale botnet probing events

Z Li, A Goyal, Y Chen, V Paxson - … of the 4th International Symposium on …, 2009 - dl.acm.org
Botnets dominate today's attack landscape. In this work we investigate ways to analyze
collections of malicious probing traffic in order to understand the significance of large-scale" …