A survey on encrypted network traffic analysis applications, techniques, and countermeasures

E Papadogiannaki, S Ioannidis - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
The adoption of network traffic encryption is continually growing. Popular applications use
encryption protocols to secure communications and protect the privacy of users. In addition …

Systems and methods for detecting and inhibiting attacks using honeypots

S Sidiroglou, AD Keromytis… - US Patent 7,904,959, 2011 - Google Patents
In accordance with some embodiments, systems and methods that protect an application
from attacks are provided. In some embodiments, traffic from a communication network is …

X-Diff: An effective change detection algorithm for XML documents

Y Wang, DJ DeWitt, JY Cai - Proceedings 19th international …, 2003 - ieeexplore.ieee.org
XML has become the de facto standard format for Web publishing and data transportation.
Since online information changes frequently, being able to quickly detect changes in XML …

Gnort: High performance network intrusion detection using graphics processors

G Vasiliadis, S Antonatos, M Polychronakis… - Recent Advances in …, 2008 - Springer
The constant increase in link speeds and number of threats poses challenges to network
intrusion detection systems (NIDS), which must cope with higher traffic throughput and …

Scalable pattern matching for high speed networks

CR Clark, DE Schimmel - 12th Annual IEEE Symposium on …, 2004 - ieeexplore.ieee.org
In this paper, we present a scalable FPGA design methodology for searching network packet
payloads for a large number of patterns, including complex regular expressions. The …

Hyperscan: A fast multi-pattern regex matcher for modern {CPUs}

X Wang, Y Hong, H Chang, KS Park… - … USENIX Symposium on …, 2019 - usenix.org
Regular expression matching serves as a key functionality of modern network security
applications. Unfortunately, it often becomes the performance bottleneck as it involves …

Which open-source ids? Snort, suricata or zeek

A Waleed, AF Jamali, A Masood - Computer Networks, 2022 - Elsevier
Driven by the high and diverse network traffic and increase in the number of active attackers,
nearly every organization including government institutions and enterprises are forced to …

Kargus: a highly-scalable software-based intrusion detection system

MA Jamshed, J Lee, S Moon, I Yun, D Kim… - Proceedings of the …, 2012 - dl.acm.org
As high-speed networks are becoming commonplace, it is increasingly challenging to
prevent the attack attempts at the edge of the Internet. While many high-performance …

[PDF][PDF] Detecting targeted attacks using shadow honeypots

KG Anagnostakis, S Sidiroglou, P Akritidis, K **nidis… - 2005 - usenix.org
Abstract We present Shadow Honeypots, a novel hybrid architecture that combines the best
features of honeypots and anomaly detection. At a high level, we use a variety of anomaly …

[KIRJA][B] The state of the art in intrusion prevention and detection

ASK Pathan - 2014 - api.taylorfrancis.com
Most of the security threats in various communications networks are posed by the illegitimate
entities that enter or intrude within the network perimeter, which could commonly be termed …