Towards Large‐Scale, Heterogeneous Anomaly Detection Systems in Industrial Networks: A Survey of Current Trends

M Iturbe, I Garitano, U Zurutuza… - Security and …, 2017 - Wiley Online Library
Industrial Networks (INs) are widespread environments where heterogeneous devices
collaborate to control and monitor physical processes. Some of the controlled processes …

Scanning the internet for liveness

S Bano, P Richter, M Javed, S Sundaresan… - ACM SIGCOMM …, 2018 - dl.acm.org
Internet-wide scanning depends on a notion of liveness: does a target IP address respond to
a probe packet? However, the interpretation of such responses, or lack of them, is nuanced …

Blacklist ecosystem analysis: Spanning jan 2012 to jun 2014

L Metcalf, JM Spring - Proceedings of the 2nd ACM Workshop on …, 2015 - dl.acm.org
Motivation: We compare the contents of 86 Internet blacklists to provide a view of the whole
ecosystem of blocking network touch points and blacklists. We aim to formalize and evaluate …

Anomaly-based intrusion detection by modeling probability distributions of flow characteristics

B Atli - 2017 - aaltodoc.aalto.fi
In recent years, with the increased use of network communication, the risk of compromising
the information has grown immensely. Intrusions have evolved and become more …

Network flow query language—Design, implementation, performance, and applications

V Bajpai, J Schönwälder - IEEE Transactions on Network and …, 2016 - ieeexplore.ieee.org
Cisco's NetFlow protocol and Internet engineering task force's Internet protocol flow
information export open standard are widely deployed protocols for collecting network flow …

Open-source measurement of fast-flux networks while considering domain-name parking

LB Metcalf, D Ruef, JM Spring - The LASER Workshop: Learning from …, 2017 - usenix.org
Background: Fast-flux is a technique malicious actors use for resilient malware
communications. In this paper, domain parking is the practice of assigning a nonsense …

Superflows: A New Tool for Forensic Network Flow Analysis

M Collins, JV Deshmukh, D Dinesh… - arxiv preprint arxiv …, 2024 - arxiv.org
Network security analysts gather data from diverse sources, from high-level summaries of
network flow and traffic volumes to low-level details such as service logs from servers and …

[PDF][PDF] Domain parking: Not as malicious as expected

L Metcalf, J Spring - Technical Report CERTCC-2014-57, 2014 - resources.sei.cmu.edu
Domain parking is the practice of assigning a nonsense location to a fully-qualified domain
name (FQDN) when it is not in use in order to keep it ready for “live” use. This practice is …

Human decision-making in computer security incident response

JM Spring - 2019 - discovery.ucl.ac.uk
Background: Cybersecurity has risen to international importance. Almost every organization
will fall victim to a successful cyberattack. Yet, guidance for computer security incident …

Compactflow: A hybrid binary format for network flow data

M Piskozub, R Spolaor, I Martinovic - … Theory and Practice: 13th IFIP WG …, 2020 - Springer
Network traffic monitoring has become fundamental to obtaining insights about a network
and its activities. This knowledge allows network administrators to detect anomalies, identify …