There are two essential goals of this research. The first goal is to design and construct a computational environment that is used for studying large and complex datasets in the cybersecurity domain. The second goal is to analyse the Spamhaus blacklist query dataset which includes uncovering the properties of blacklisted hosts and understanding the nature of blacklisted hosts over time. The analytical environment enables deep analysis of very large and complex datasets by exploiting the divide and recombine framework. The capability to analyse data in depth enables one to go beyond just summary statistics in research. This deep analysis is at the highest level of granularity without any compromise on the size of the data. The environment is...
Even though network traffic is typically encrypted, and it is almost impossible to look into the con...
Attacks against computers and the internet are in the news every week. These primarily take the form...
The 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS 2016), Larnac...
There are two essential goals of this research. The first goal is to design and construct a computat...
We have collected several large-scale datasets in a number of passive measurement projects on an Int...
Careful examination of the composition and concentration of malicious traffic in transit on the chan...
We have collected several large-scale datasets in a number of passive measurement projects on an Int...
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, System Design and...
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, Engineering Syste...
Despite a Network Anomaly Detection System (NADS) being capable of detecting existing and zero-day a...
Big Data analysis is of great challenges in practice. The data set sizes will grow quickly. And anal...
Thesis (Ph.D.)--Boston UniversityPLEASE NOTE: Boston University Libraries did not receive an Authori...
Nowadays, computer networks have become incredibly complex due to the evolution of online services a...
We use anonymized flow data collected from a 10Gbps backbone link to discover and analyze malicious ...
This thesis explores four research areas that are examined using DNS traffic analysis. The tools use...
Even though network traffic is typically encrypted, and it is almost impossible to look into the con...
Attacks against computers and the internet are in the news every week. These primarily take the form...
The 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS 2016), Larnac...
There are two essential goals of this research. The first goal is to design and construct a computat...
We have collected several large-scale datasets in a number of passive measurement projects on an Int...
Careful examination of the composition and concentration of malicious traffic in transit on the chan...
We have collected several large-scale datasets in a number of passive measurement projects on an Int...
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, System Design and...
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, Engineering Syste...
Despite a Network Anomaly Detection System (NADS) being capable of detecting existing and zero-day a...
Big Data analysis is of great challenges in practice. The data set sizes will grow quickly. And anal...
Thesis (Ph.D.)--Boston UniversityPLEASE NOTE: Boston University Libraries did not receive an Authori...
Nowadays, computer networks have become incredibly complex due to the evolution of online services a...
We use anonymized flow data collected from a 10Gbps backbone link to discover and analyze malicious ...
This thesis explores four research areas that are examined using DNS traffic analysis. The tools use...
Even though network traffic is typically encrypted, and it is almost impossible to look into the con...
Attacks against computers and the internet are in the news every week. These primarily take the form...
The 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS 2016), Larnac...