This dissertation addresses Internet background traffic generation and network intrusion detection. It is organized in two parts. Part one introduces a method to model realistic Internet background traffic and demonstrates how the models are used both in a simulation environment and in a lab environment. Part two introduces two different NID (Network Intrusion Detection) techniques and evaluates them using the modeled background traffic. To demonstrate the approach we modeled five major application layer protocols: HTTP, FTP, SSH, SMTP and POP3. The model of each protocol includes an empirical probability distribution plus estimates of application-specific parameters. Due to the complexity of the traffic, hybrid distributions (called mixtur...
The evolving Internet and other network technologies have dramatically increased the amount of secur...
Many networking researches depend on an accurate simulation of network traffic. For example, Intrusi...
Due to the introduction of the devices for networking with the fast internet development in earlier ...
This dissertation presents our work on network intrusion detection and intrusion sim- ulation. The w...
This paper reports results of an effort to develop a test environment in which live attack-free ba...
This paper reports results of an effort to develop a test environment in which live attack-free ba...
Techniques for detecting previously unseen network intrusion attempts often depend on finding anomal...
Internet background traffic modeling and simulation is the main challenge when constructing a test e...
This report presents two models that are used to detect the user abnormal behavior and network intru...
Network security is still at its infancy. Existing intrusion detection and prevention solutions lack...
Network intrusion detection is a task aimed to identify malicious network traffic. Malicious network...
Network intrusion detection is a task aimed to identify malicious network traffic. Malicious network...
Cybersecurity is an arms race, with both the security and the adversaries attempting to outsmart one...
In this PhD Thesis we developed models for the abnormal network traffic based on TCP/IP communicatio...
Computer networks are now relied on more than ever before for gathering information and performing e...
The evolving Internet and other network technologies have dramatically increased the amount of secur...
Many networking researches depend on an accurate simulation of network traffic. For example, Intrusi...
Due to the introduction of the devices for networking with the fast internet development in earlier ...
This dissertation presents our work on network intrusion detection and intrusion sim- ulation. The w...
This paper reports results of an effort to develop a test environment in which live attack-free ba...
This paper reports results of an effort to develop a test environment in which live attack-free ba...
Techniques for detecting previously unseen network intrusion attempts often depend on finding anomal...
Internet background traffic modeling and simulation is the main challenge when constructing a test e...
This report presents two models that are used to detect the user abnormal behavior and network intru...
Network security is still at its infancy. Existing intrusion detection and prevention solutions lack...
Network intrusion detection is a task aimed to identify malicious network traffic. Malicious network...
Network intrusion detection is a task aimed to identify malicious network traffic. Malicious network...
Cybersecurity is an arms race, with both the security and the adversaries attempting to outsmart one...
In this PhD Thesis we developed models for the abnormal network traffic based on TCP/IP communicatio...
Computer networks are now relied on more than ever before for gathering information and performing e...
The evolving Internet and other network technologies have dramatically increased the amount of secur...
Many networking researches depend on an accurate simulation of network traffic. For example, Intrusi...
Due to the introduction of the devices for networking with the fast internet development in earlier ...