In today's world, more and more people are managing every aspect of their lives over the Internet. As a result, the study of Internet traffic, which is undergoing constant evolution as new technologies emerge, has attracted much attention from the research community. In this dissertation, we present a three-pronged approach to help ISPs and network administrators: a) gain insight about the applications that generate traffic in their networks, b) understand the Web browsing behaviors of their users, and c) detect in a timely fashion when external malicious entities seek to compromise their websites.The first component of our approach is SubFlow, a Machine Learning-based tool that classifies traffic flows into classes of applications that gen...
Recent work in traffic analysis has shown that traffic patterns leaked through side channels can be ...
Internet background radiation (IBR) is a very interesting piece of Internet traffic as it is the res...
Nowadays, computer networks have become incredibly complex due to the evolution of online services a...
Abstract—More and more applications and services move to the web and this has led to web traffic amo...
Legitimate web browser redirection is often used to take users to web pages that have moved or to he...
The prevalence of HTTP web traffic on the Internet has long transcended the layer 7 classification, ...
Characterising network traffic is a critical step for detecting network intrusion or misuse. The tra...
Conventional network security solutions are performed on networklayer packets using statistical meas...
Understanding Internet user behavior and Internet usage patterns is fundamental in developing future...
Detecting and investigating intrusive Internet activity is an ever-present challenge for network adm...
Abstract—This paper describes an approach to enforce depen-dencies between network traffic and user ...
The current fight between security experts and malware authors is an arms race. In this race, malwar...
Abstract—Internal network security threats are becoming in-creasingly dangerous and difficult to det...
International audienceMalware is a major threat to security and privacy of network users. A huge var...
Part 4: SecurityInternational audienceInternet scanning is a de facto background traffic noise that ...
Recent work in traffic analysis has shown that traffic patterns leaked through side channels can be ...
Internet background radiation (IBR) is a very interesting piece of Internet traffic as it is the res...
Nowadays, computer networks have become incredibly complex due to the evolution of online services a...
Abstract—More and more applications and services move to the web and this has led to web traffic amo...
Legitimate web browser redirection is often used to take users to web pages that have moved or to he...
The prevalence of HTTP web traffic on the Internet has long transcended the layer 7 classification, ...
Characterising network traffic is a critical step for detecting network intrusion or misuse. The tra...
Conventional network security solutions are performed on networklayer packets using statistical meas...
Understanding Internet user behavior and Internet usage patterns is fundamental in developing future...
Detecting and investigating intrusive Internet activity is an ever-present challenge for network adm...
Abstract—This paper describes an approach to enforce depen-dencies between network traffic and user ...
The current fight between security experts and malware authors is an arms race. In this race, malwar...
Abstract—Internal network security threats are becoming in-creasingly dangerous and difficult to det...
International audienceMalware is a major threat to security and privacy of network users. A huge var...
Part 4: SecurityInternational audienceInternet scanning is a de facto background traffic noise that ...
Recent work in traffic analysis has shown that traffic patterns leaked through side channels can be ...
Internet background radiation (IBR) is a very interesting piece of Internet traffic as it is the res...
Nowadays, computer networks have become incredibly complex due to the evolution of online services a...