Network scanning is a common, effective technique to search for vulnerable Internet hosts and to explore the topology and trust relationships between hosts in a target network. Given that the purpose of scanning is to search for responsive hosts and network services, behavior-based scanning detection techniques based on the state of inbound connection attempts remain effective against evasion. Many of today's network environments, however, feature a dynamic and transient nature with several network hosts and services added or stopped (either permanently or temporarily) over time. In this paper, working with recent network traces from two different environments, we re-examine the Threshold Random Walk (TRW) scan detection algorithm, and we s...
Network traffic anomalies stand for a large fraction of the Internet traffic andcompromise the perfo...
Abstract. Scan detection and suppression methods are an important means for preventing the disclosur...
International audienceIn this work we develop an approach for anomaly detection for large scale netw...
Scans are often used by adversaries to determine the potential weaknesses in a target network or sys...
Network scanning reveals valuable information of accessible hosts over the Internet and their offere...
Scanning activity is a common activity on the Internet today, representing malicious activity such a...
Scanning activity is a common activity on the Internet today, representing malicious activity such a...
Although network reconnaissance through scanning has been well explored in the literature, new scan ...
We present two light-weight worm detection algorithms that offer significant advantages over fixed-t...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
Network attacks often employ scanning to locate vulnerable hosts and services. Unimpeded scanning ca...
Network attacks often employ scanning to locate vulnerable hosts and services. Unimpeded scanning ca...
© 2005 Ms. Dana ZhangA prelude to most malicious network attacks involves a systematic scan on a tar...
While it is widely known that port scanning is widespread, neither the scanning landscape nor the de...
Since the link rate is very high up to 40Gbps these days, scanning packets can spread very fast. At ...
Network traffic anomalies stand for a large fraction of the Internet traffic andcompromise the perfo...
Abstract. Scan detection and suppression methods are an important means for preventing the disclosur...
International audienceIn this work we develop an approach for anomaly detection for large scale netw...
Scans are often used by adversaries to determine the potential weaknesses in a target network or sys...
Network scanning reveals valuable information of accessible hosts over the Internet and their offere...
Scanning activity is a common activity on the Internet today, representing malicious activity such a...
Scanning activity is a common activity on the Internet today, representing malicious activity such a...
Although network reconnaissance through scanning has been well explored in the literature, new scan ...
We present two light-weight worm detection algorithms that offer significant advantages over fixed-t...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
Network attacks often employ scanning to locate vulnerable hosts and services. Unimpeded scanning ca...
Network attacks often employ scanning to locate vulnerable hosts and services. Unimpeded scanning ca...
© 2005 Ms. Dana ZhangA prelude to most malicious network attacks involves a systematic scan on a tar...
While it is widely known that port scanning is widespread, neither the scanning landscape nor the de...
Since the link rate is very high up to 40Gbps these days, scanning packets can spread very fast. At ...
Network traffic anomalies stand for a large fraction of the Internet traffic andcompromise the perfo...
Abstract. Scan detection and suppression methods are an important means for preventing the disclosur...
International audienceIn this work we develop an approach for anomaly detection for large scale netw...