After many research efforts, Network Intrusion Detection Systems still have much room for improvement. This paper proposes a novel method for automatic and timely analysis of traffic generated by large networks, which is able to identify malicious external hosts even if their activities do not raise any alert by existing defensive systems. Our proposal focuses on periodic communications, since our experimental evaluation shows that they are more related to malicious activities, and it can be easily integrated with other detection systems. We highlight that periodic network activities can occur at very different intervals ranging from seconds to hours, hence a timely analysis of long time-windows of the traffic generated by large organiza...
Advanced Persistent Threats (APTs) are the most critical menaces to modern organizations and the mos...
Advanced Persistent Threats (APTs) are the most critical menaces to modern organizations and the mos...
Although network intrusion detection systems (IDSs) have been studied for several years, their opera...
After many research efforts, Network Intrusion Detection Systems still have much room for improvemen...
none5noAfter many research efforts, Network Intrusion Detection Systems still have much room for imp...
After many research efforts, Network Intrusion Detection Systems still have much room for improvemen...
After many research efforts, Network Intrusion Detection Systems still have much room for improvemen...
It is clearly in the interest of network administrators to detect hosts within their networks that a...
Conventional network security solutions are performed on networklayer packets using statistical meas...
Abstract. Conventional network security solutions are performed on network-layer packets using stati...
thesisSecurity professionals are in constant battle with the recent trend of sophisticated malware t...
Nowadays, computer networks have become incredibly complex due to the evolution of online services a...
Advanced Persistent Threats (APTs) are the most critical menaces to modern organizations and the mos...
Although network intrusion detection systems (IDSs) have been studied for several years, their opera...
This paper presents a novel network intrusion detection method that searches for frequency patterns ...
Advanced Persistent Threats (APTs) are the most critical menaces to modern organizations and the mos...
Advanced Persistent Threats (APTs) are the most critical menaces to modern organizations and the mos...
Although network intrusion detection systems (IDSs) have been studied for several years, their opera...
After many research efforts, Network Intrusion Detection Systems still have much room for improvemen...
none5noAfter many research efforts, Network Intrusion Detection Systems still have much room for imp...
After many research efforts, Network Intrusion Detection Systems still have much room for improvemen...
After many research efforts, Network Intrusion Detection Systems still have much room for improvemen...
It is clearly in the interest of network administrators to detect hosts within their networks that a...
Conventional network security solutions are performed on networklayer packets using statistical meas...
Abstract. Conventional network security solutions are performed on network-layer packets using stati...
thesisSecurity professionals are in constant battle with the recent trend of sophisticated malware t...
Nowadays, computer networks have become incredibly complex due to the evolution of online services a...
Advanced Persistent Threats (APTs) are the most critical menaces to modern organizations and the mos...
Although network intrusion detection systems (IDSs) have been studied for several years, their opera...
This paper presents a novel network intrusion detection method that searches for frequency patterns ...
Advanced Persistent Threats (APTs) are the most critical menaces to modern organizations and the mos...
Advanced Persistent Threats (APTs) are the most critical menaces to modern organizations and the mos...
Although network intrusion detection systems (IDSs) have been studied for several years, their opera...