Network abuse monitoring (eg., for intrusions and denial of service attacks) is an important component in security architecture. Monitoring unused IP addresses offers opportunities to significantly improve perspective on abuse activity without many of the problems associated with typical network intrusion detection and firewall systems. In this paper, we describe a scalable architecture for an IP traffic monitoring system called an Internet Sink (isink). The objective of this system is to measure abuse activity on unused or "dark" IP addresses in an efficient and scalable fashion. A distinguishing feature of an isink in contrast to traditional intrusion detection systems or firewalls, is that it includes a stateless active component that ge...
As national infrastructure becomes intertwined with emerging global data networks, the stability and...
Our society is facing a growing threat from data breaches, where confidential information is stolen ...
This report presents two models that are used to detect the user abnormal behavior and network intru...
Today’s evolving networks are experiencing a large number of different attacks ranging from system b...
This thesis seeks to use knowledge of Internet addressing to improve Internet security. Its goal is ...
Networks are increasingly subjected to threats that affect the reliability of critical infrastructur...
The Internet is not a safe place. Unsecured hosts can expect to be compromised within minutes of con...
The Internet Protocol (IP) defines the format by which packets are relayed throughout and across net...
The threat of malicious Internet activities such as Distributed Denial of Service (DDoS) attacks, sp...
The study of security in computer networks is a rapidly growing area of interest because of the prol...
The importance of network security has grown tremendously and intrusion prevention/detection systems...
Network-based intruders such as (DoS) attacks have become one of the most significant internet inter...
This paper focuses on theoretical and practical methods for detecting bandwidth attacks upon network...
Many types of brute-force attacks are known to exhibit a characteristic ‘flat’ behavior at the netwo...
Most past solutions for detecting denial of service attacks (and identifying the perpetrators) have ...
As national infrastructure becomes intertwined with emerging global data networks, the stability and...
Our society is facing a growing threat from data breaches, where confidential information is stolen ...
This report presents two models that are used to detect the user abnormal behavior and network intru...
Today’s evolving networks are experiencing a large number of different attacks ranging from system b...
This thesis seeks to use knowledge of Internet addressing to improve Internet security. Its goal is ...
Networks are increasingly subjected to threats that affect the reliability of critical infrastructur...
The Internet is not a safe place. Unsecured hosts can expect to be compromised within minutes of con...
The Internet Protocol (IP) defines the format by which packets are relayed throughout and across net...
The threat of malicious Internet activities such as Distributed Denial of Service (DDoS) attacks, sp...
The study of security in computer networks is a rapidly growing area of interest because of the prol...
The importance of network security has grown tremendously and intrusion prevention/detection systems...
Network-based intruders such as (DoS) attacks have become one of the most significant internet inter...
This paper focuses on theoretical and practical methods for detecting bandwidth attacks upon network...
Many types of brute-force attacks are known to exhibit a characteristic ‘flat’ behavior at the netwo...
Most past solutions for detecting denial of service attacks (and identifying the perpetrators) have ...
As national infrastructure becomes intertwined with emerging global data networks, the stability and...
Our society is facing a growing threat from data breaches, where confidential information is stolen ...
This report presents two models that are used to detect the user abnormal behavior and network intru...