Management of enterprise networks is a challenging problem because of their continued growth in size and functionality. We propose and evaluate a framework, Godai , which addresses the challenges in (i) setting thresholds in end host anomaly detectors,(ii) hierarchical summarization in data and (ii) application traffic classification. Godai enables IT operators to identify the end hosts that have been enslaved by an attacker to launch attacks and Godai achieves it by diversifying anomaly detector configuration. The general policies in the framework are holistic and achieve two goals: (a)balance the trade-offs between false alarm and mis-detection rates and (b) show that the benefits of full diversity can be attained at reduced complexit...
Internet of Things (IoT) devices are becoming increasingly prevalent as time goes on, as they presen...
Network security implements various strategies for the identification and prevention of security bre...
This dissertation explores technological advances for network programmability and softwarization to ...
Inter and intra-network connectivity have become a useful resource for accessibility and flexibility...
Enterprise networks are both complex and dynamic, with various kinds of servers (web, email, VPN, st...
The evolution of the cyber threat landscape drives companies towards state-of-the-art security monit...
Smart building equipment and automation systems often become a target of attacks and are used for at...
With the increasing number of network threats it is essential to have a knowledge of existing and ne...
Nowadays, computer networks have become incredibly complex due to the evolution of online services a...
Information systems and their services (referred to as cyberspace) are ubiquitous and touch all aspe...
Abstract: New datamining techniques are developed for generating frequent episode rules of traffic e...
In this paper, we present the design and implementation of a new approach for anomaly detection and ...
Techniques for network-based intrusion detection have been evolving for years, and the focus of most...
Computer crime is a large problem (CSI, 2004; Kabay, 2001a; Kabay, 2001b). Security managers have a ...
Characterising network traffic is a critical step for detecting network intrusion or misuse. The tra...
Internet of Things (IoT) devices are becoming increasingly prevalent as time goes on, as they presen...
Network security implements various strategies for the identification and prevention of security bre...
This dissertation explores technological advances for network programmability and softwarization to ...
Inter and intra-network connectivity have become a useful resource for accessibility and flexibility...
Enterprise networks are both complex and dynamic, with various kinds of servers (web, email, VPN, st...
The evolution of the cyber threat landscape drives companies towards state-of-the-art security monit...
Smart building equipment and automation systems often become a target of attacks and are used for at...
With the increasing number of network threats it is essential to have a knowledge of existing and ne...
Nowadays, computer networks have become incredibly complex due to the evolution of online services a...
Information systems and their services (referred to as cyberspace) are ubiquitous and touch all aspe...
Abstract: New datamining techniques are developed for generating frequent episode rules of traffic e...
In this paper, we present the design and implementation of a new approach for anomaly detection and ...
Techniques for network-based intrusion detection have been evolving for years, and the focus of most...
Computer crime is a large problem (CSI, 2004; Kabay, 2001a; Kabay, 2001b). Security managers have a ...
Characterising network traffic is a critical step for detecting network intrusion or misuse. The tra...
Internet of Things (IoT) devices are becoming increasingly prevalent as time goes on, as they presen...
Network security implements various strategies for the identification and prevention of security bre...
This dissertation explores technological advances for network programmability and softwarization to ...