An overview of IP flow-based intrusion detection
Intrusion detection is an important area of research. Traditionally, the approach taken to find
attacks is to inspect the contents of every packet. However, packet inspection cannot easily …
attacks is to inspect the contents of every packet. However, packet inspection cannot easily …
Identifying propagation sources in networks: State-of-the-art and comparative studies
It has long been a significant but difficult problem to identify propagation sources based on
limited knowledge of network structures and the varying states of network nodes. In practice …
limited knowledge of network structures and the varying states of network nodes. In practice …
Adversarial machine learning-industry perspectives
RSS Kumar, M Nyström, J Lambert… - 2020 IEEE security …, 2020 - ieeexplore.ieee.org
Based on interviews with 28 organizations, we found that industry practitioners are not
equipped with tactical and strategic tools to protect, detect and respond to attacks on their …
equipped with tactical and strategic tools to protect, detect and respond to attacks on their …
Kernel pooling for convolutional neural networks
Abstract Convolutional Neural Networks (CNNs) with Bilinear Pooling, initially in their full
form and later using compact representations, have yielded impressive performance gains …
form and later using compact representations, have yielded impressive performance gains …
Countering code-injection attacks with instruction-set randomization
We describe a new, general approach for safeguarding systems against any type of code-
injection attack. We apply Kerckhoff's principle, by creating process-specific randomized …
injection attack. We apply Kerckhoff's principle, by creating process-specific randomized …
Model-based evaluation: from dependability to security
The development of techniques for quantitative, model-based evaluation of computer system
dependability has a long and rich history. A wide array of model-based evaluation …
dependability has a long and rich history. A wide array of model-based evaluation …
Method and system for detecting malicious and/or botnet-related domain names
A method and system of detecting a malicious and/or botnet-related domain name,
comprising: reviewing a domain name used in Domain Name System (DNS) traffic in a …
comprising: reviewing a domain name used in Domain Name System (DNS) traffic in a …
Method and system for detecting and responding to attacking networks
A system and method for detecting a first network of compromised computers in a second
network of computers, comprising: collecting Domain Name System (DNS) data for the …
network of computers, comprising: collecting Domain Name System (DNS) data for the …
Modeling the spread of active worms
Active worms spread in an automated fashion and can flood the Internet in a very short time.
Modeling the spread of active worms can help us understand how active worms spread, and …
Modeling the spread of active worms can help us understand how active worms spread, and …
[PDF][PDF] Modeling Botnet Propagation Using Time Zones.
Time zones play an important and unexplored role in malware epidemics. To understand
how time and location affect malware spread dynamics, we studied botnets, or large …
how time and location affect malware spread dynamics, we studied botnets, or large …