© 2013 Dr. Alif WahidThe Internet is a globally significant infrastructure that attracts a large number of threats posed by the population of malicious hosts within it. These threats scale with the size of the malicious host population, which makes the accurate estimation of this population an important challenge. The difficulty of this challenge is further compounded by the conflicting requirements of preserving the privacy of bystanders associated with malicious host behaviour while accurately identifying malicious host instances across the Internet. In this thesis, we address this challenge of estimating the Internet malicious host population while preserving privacy. We begin by identifying...
In this paper, we study potential inference attacks targeting location-based service (LBS) users. In...
Millions of users employ secure and privacy preserving systems to prevent privacy-intrusive and mali...
Hosting providers are theoretically in a key position to combat cybercrime as they are often the ent...
This thesis seeks to use knowledge of Internet addressing to improve Internet security. Its goal is ...
A significant part of current Internet attacks originates from hosts that are distributed all over t...
Abstract: "Hosts connected to the Internet are exposed to a wide array of attacks. Multiple methods ...
It is a well-known fact that the progress of personal communication devices leads to serious concern...
The widespread access to the Internet and the ubiquity of web-based services make it easy to communi...
abstract: IP blacklisting is a popular technique to bolster an enterprise's security, where access t...
International audienceThis paper presents a concrete and widespread example of situation where a use...
We use anonymized flow data collected from a 10Gbps backbone link to discover and analyze malicious ...
An attacker, who is able to observe a web user over a long period of time, learns a lot about his in...
Part 4: SecurityInternational audienceInternet scanning is a de facto background traffic noise that ...
The Internet was not designed with security in mind. A number of recent protocols such as Encrypted ...
<p>Internet-based services routinely contend with a range of malicious activity (e.g., spam, scans, ...
In this paper, we study potential inference attacks targeting location-based service (LBS) users. In...
Millions of users employ secure and privacy preserving systems to prevent privacy-intrusive and mali...
Hosting providers are theoretically in a key position to combat cybercrime as they are often the ent...
This thesis seeks to use knowledge of Internet addressing to improve Internet security. Its goal is ...
A significant part of current Internet attacks originates from hosts that are distributed all over t...
Abstract: "Hosts connected to the Internet are exposed to a wide array of attacks. Multiple methods ...
It is a well-known fact that the progress of personal communication devices leads to serious concern...
The widespread access to the Internet and the ubiquity of web-based services make it easy to communi...
abstract: IP blacklisting is a popular technique to bolster an enterprise's security, where access t...
International audienceThis paper presents a concrete and widespread example of situation where a use...
We use anonymized flow data collected from a 10Gbps backbone link to discover and analyze malicious ...
An attacker, who is able to observe a web user over a long period of time, learns a lot about his in...
Part 4: SecurityInternational audienceInternet scanning is a de facto background traffic noise that ...
The Internet was not designed with security in mind. A number of recent protocols such as Encrypted ...
<p>Internet-based services routinely contend with a range of malicious activity (e.g., spam, scans, ...
In this paper, we study potential inference attacks targeting location-based service (LBS) users. In...
Millions of users employ secure and privacy preserving systems to prevent privacy-intrusive and mali...
Hosting providers are theoretically in a key position to combat cybercrime as they are often the ent...