As desktops and servers become more complicated, they employ an increasing amount of automatic, non-user initiated communication. Such communication can be good (OS updates, RSS feed readers, and mail polling), bad (keyloggers, spyware, and botnet command-and-control), or ugly (adware or unauthorized peer-to-peer applications). Communication in these applications is often regular, but with very long periods, ranging from minutes to hours. This infrequent communication and the complexity of today\u27s systems makes these applications difficult for users to detect and diagnose. In this paper we present a new approach to identify low-rate periodic network traffic and changes in such regular communication. We employ signal-processing techniques...
Detecting polling behaviour in a computer network has two important applications. First, the polling...
The aim of this research is to analyze aggregate network traffic for anomaly detection. The accurate...
Monitoring and measuring various metrics of high speed and high capacity networks produces a vast am...
As desktops and servers become more complicated, they employ an increasing amount of automatic, non-...
This paper addresses the problem of detecting the presence of malware that leave periodic traces in ...
After many research efforts, Network Intrusion Detection Systems still have much room for improvemen...
Due to the growing risks associated with owning a computer, most individuals and businesses run one ...
AbstractBotnets are large networks of bots (compromised machines) that are under the control of a sm...
UnrestrictedInternet traffic contains a rich set of periodic patterns. Examples include regular pack...
Industrial control systems play a major role in the operation of critical infrastructure assets. Due...
Traditional antivirus products are signature-based solutions, which rely on a static database to per...
Traditional antivirus products are signature-based solutions, which rely on a static database to per...
A botnet is a large network of bots that are under the control of a bot herder. Botnets have become ...
Botnets pose a significant threat to network-based applications and communications; it is believed t...
The article presents a research in the field of complex sensing, detection, and recovery of communic...
Detecting polling behaviour in a computer network has two important applications. First, the polling...
The aim of this research is to analyze aggregate network traffic for anomaly detection. The accurate...
Monitoring and measuring various metrics of high speed and high capacity networks produces a vast am...
As desktops and servers become more complicated, they employ an increasing amount of automatic, non-...
This paper addresses the problem of detecting the presence of malware that leave periodic traces in ...
After many research efforts, Network Intrusion Detection Systems still have much room for improvemen...
Due to the growing risks associated with owning a computer, most individuals and businesses run one ...
AbstractBotnets are large networks of bots (compromised machines) that are under the control of a sm...
UnrestrictedInternet traffic contains a rich set of periodic patterns. Examples include regular pack...
Industrial control systems play a major role in the operation of critical infrastructure assets. Due...
Traditional antivirus products are signature-based solutions, which rely on a static database to per...
Traditional antivirus products are signature-based solutions, which rely on a static database to per...
A botnet is a large network of bots that are under the control of a bot herder. Botnets have become ...
Botnets pose a significant threat to network-based applications and communications; it is believed t...
The article presents a research in the field of complex sensing, detection, and recovery of communic...
Detecting polling behaviour in a computer network has two important applications. First, the polling...
The aim of this research is to analyze aggregate network traffic for anomaly detection. The accurate...
Monitoring and measuring various metrics of high speed and high capacity networks produces a vast am...