We describe an Internet-based collaborative environment that protects geographically dispersed organizations of a critical infrastructure (e.g., financial institutions, telco providers) from coordinated cyber attacks. A specific instance of a collaborative environment for detecting malicious inter-domain port scans is introduced. This instance uses the open source Complex Event Processing (CEP) engine ESPER to correlate massive amounts of network traffic data exhibiting the evidence of those scans. The paper presents two inter-domain SYN port scan detection algorithms we designed, implemented in ESPER, and deployed on the collaborative environment; namely, Rank-based SYN (R-SYN) and Line Fitting. The paper shows the usefulness of the collab...
Port scans are typically at the begin of a chain of events that will lead to the attack and exploita...
This paper addresses the problem of collaborative analy-sis in a distributed setting via a network s...
The rapidly increasing array of Internet-scale threats is a pressing problem for every organization ...
Large enterprises are nowadays complex interconnected software systems spanning over several domains...
In this paper we analyze the coordinated port scan attack where a single adversary coordinates a Gro...
Organizations must protect their information systems from a variety of threats. Usually they employ ...
The rapidly increasing array of Internet-scale threats is a pressing problem for every organization ...
Abstract—Most network attackers perform port scanning in-dividually, without synchronization, to fin...
Abstract—In this paper, we present a network analysis and surveillance system based on the Complex E...
Over recent years, network-based attacks have become to one of the top causes of network infrastruct...
Over recent years, network-based attacks have become to one of the top causes of network infrastruct...
This chapter describes a distributed architecture for collaborative detection of cyber attacks and n...
In this research, we present theoretical models and practical solutions to model and analyze collabo...
This dissertation explores technological advances for network programmability and softwarization to ...
Currently, IP networks are constantly harmed by several attack techniques such as port scans, denial...
Port scans are typically at the begin of a chain of events that will lead to the attack and exploita...
This paper addresses the problem of collaborative analy-sis in a distributed setting via a network s...
The rapidly increasing array of Internet-scale threats is a pressing problem for every organization ...
Large enterprises are nowadays complex interconnected software systems spanning over several domains...
In this paper we analyze the coordinated port scan attack where a single adversary coordinates a Gro...
Organizations must protect their information systems from a variety of threats. Usually they employ ...
The rapidly increasing array of Internet-scale threats is a pressing problem for every organization ...
Abstract—Most network attackers perform port scanning in-dividually, without synchronization, to fin...
Abstract—In this paper, we present a network analysis and surveillance system based on the Complex E...
Over recent years, network-based attacks have become to one of the top causes of network infrastruct...
Over recent years, network-based attacks have become to one of the top causes of network infrastruct...
This chapter describes a distributed architecture for collaborative detection of cyber attacks and n...
In this research, we present theoretical models and practical solutions to model and analyze collabo...
This dissertation explores technological advances for network programmability and softwarization to ...
Currently, IP networks are constantly harmed by several attack techniques such as port scans, denial...
Port scans are typically at the begin of a chain of events that will lead to the attack and exploita...
This paper addresses the problem of collaborative analy-sis in a distributed setting via a network s...
The rapidly increasing array of Internet-scale threats is a pressing problem for every organization ...