Position paper: A systematic framework for categorising IoT device fingerprinting mechanisms
The popularity of the Internet of Things (IoT) devices makes it increasingly important to be
able to fingerprint them, for example in order to detect if there are misbehaving or even …
able to fingerprint them, for example in order to detect if there are misbehaving or even …
Flexfringe: a passive automaton learning package
Finite state models, such as Mealy machines or state charts, are often used to express and
specify protocol and software behavior. Consequently, these models are often used in …
specify protocol and software behavior. Consequently, these models are often used in …
BotGM: Unsupervised graph mining to detect botnets in traffic flows
Botnets are one of the most dangerous and serious cybersecurity threats since they are a
major vector of large-scale attack campaigns such as phishing, distributed denial-of-service …
major vector of large-scale attack campaigns such as phishing, distributed denial-of-service …
Cbam: A contextual model for network anomaly detection
Anomaly-based intrusion detection methods aim to combat the increasing rate of zero-day
attacks, however, their success is currently restricted to the detection of high-volume attacks …
attacks, however, their success is currently restricted to the detection of high-volume attacks …
Flexfringe: Modeling software behavior by learning probabilistic automata
We present the efficient implementations of probabilistic deterministic finite automaton
learning methods available in FlexFringe. These implement well-known strategies for state …
learning methods available in FlexFringe. These implement well-known strategies for state …
Beyond labeling: Using clustering to build network behavioral profiles of malware families
Malware family labels are known to be inconsistent. They are also black-box since they do
not represent the capabilities of malware. The current state of the art in malware capability …
not represent the capabilities of malware. The current state of the art in malware capability …
A flow-based multi-agent data exfiltration detection architecture for ultra-low latency networks
Modern network infrastructures host converged applications that demand rapid elasticity of
services, increased security, and ultra-fast reaction times. The Tactile Internet promises to …
services, increased security, and ultra-fast reaction times. The Tactile Internet promises to …
PDFA Distillation with Error Bound Guarantees
Active learning algorithms to infer probabilistic finite automata (PFA) have gained interest
recently, due to their ability to provide surrogate models for some types of neural networks …
recently, due to their ability to provide surrogate models for some types of neural networks …
Cluster analysis of malware family relationships
In this chapter, we use K-means clustering to analyze various relationships between
malware samples. We consider a dataset comprising 20 malware families with 1000 …
malware samples. We consider a dataset comprising 20 malware families with 1000 …
Intelligent malware defenses
With rapidly evolving threat landscape surrounding malware, intelligent defenses based on
machine learning are paramount. In this chapter, we review the literature proposed in the …
machine learning are paramount. In this chapter, we review the literature proposed in the …