As part of our security measures, we spend a fair amount of time and effort looking for things that might otherwise be ignored. Apart from assorted attempted penetrations, we have also discovered many examples of anomalous behavior. These range from excessive ICMP messages to nominally-local broadcast packets that have reached us from around the world. 1 Introduction For security reasons, AT&T's connection to the Internet is via a pair of application gateways[Che90]. To maintain the security of the gateways, we monitor them for attempted intrusions[Che92]. Recently, we have also started looking for more inventive penetration attempts[Bel92b]. We have indeed found such behavior. While looking, though, we noticed a surprising amount...
ABSTRACT: We present a new datamining approach to generating frequent episode rules for building ano...
Monitoring the Internet reveals incessant activity, that has been referred to as background radiatio...
Computer security is a growing problem. Over the last years, the number and variety of security atta...
As part of our security measures, we spend a fair amount of time and effort looking for things that ...
With the growing threat of abuse of network resources, it becomes increasingly important to be able ...
The TCP has provided the primary means to transfer data reliably across the Internet however TCP has...
Purpose – This study seeks to investigate modern internet back-bone traffic in order to study occurr...
The rapid increase in network bandwidth from mega bits per second to giga bits per second and potent...
Abstract: New datamining techniques are developed for generating frequent episode rules of traffic e...
Hostile network traffic is often "different " from benign traffic in ways that can be dist...
The Internet is not a safe place. Unsecured hosts can expect to be compromised within minutes of con...
Detecting intrusions falls into two categories: anomaly detection and misuse detection. The former r...
Network routers occupy a unique role in modern distributed systems. They are responsible for coopera...
Ourmon is a near real-time network monitoring and anomaly detection system that captures packets usi...
In the current digital age, a pervasive shift towards digitalization is evident in all aspects of li...
ABSTRACT: We present a new datamining approach to generating frequent episode rules for building ano...
Monitoring the Internet reveals incessant activity, that has been referred to as background radiatio...
Computer security is a growing problem. Over the last years, the number and variety of security atta...
As part of our security measures, we spend a fair amount of time and effort looking for things that ...
With the growing threat of abuse of network resources, it becomes increasingly important to be able ...
The TCP has provided the primary means to transfer data reliably across the Internet however TCP has...
Purpose – This study seeks to investigate modern internet back-bone traffic in order to study occurr...
The rapid increase in network bandwidth from mega bits per second to giga bits per second and potent...
Abstract: New datamining techniques are developed for generating frequent episode rules of traffic e...
Hostile network traffic is often "different " from benign traffic in ways that can be dist...
The Internet is not a safe place. Unsecured hosts can expect to be compromised within minutes of con...
Detecting intrusions falls into two categories: anomaly detection and misuse detection. The former r...
Network routers occupy a unique role in modern distributed systems. They are responsible for coopera...
Ourmon is a near real-time network monitoring and anomaly detection system that captures packets usi...
In the current digital age, a pervasive shift towards digitalization is evident in all aspects of li...
ABSTRACT: We present a new datamining approach to generating frequent episode rules for building ano...
Monitoring the Internet reveals incessant activity, that has been referred to as background radiatio...
Computer security is a growing problem. Over the last years, the number and variety of security atta...