The darknet monitoring system consists of network sensors widely deployed on the Internet to capture incoming unsolicited packets. A goal of this system is to analyse captured malicious packets and provide effective information to protect regular nonmalicious Internet users from malicious activities. To provide effective and reliable information, the location of sensors must be concealed. However, attackers launch localisation attacks to detect sensors in order to evade them. If the actual location of sensors is revealed, it is almost impossible to identify the latest tactics used by attackers. Thus, in a previous study, we proposed a packet sampling method, which samples incoming packets based on an attribute of the packet sender, to incre...
Botnets pose a serious threat to the health of the Internet. Most current network-based botnet detec...
Recently there has been heightened, continuous, and intrusive activity by remotely located rogue hac...
AbstractThis paper presents a machine learning approach to large-scale monitoring for malicious acti...
Abstract—Malware and botnets pose a steady and growing threat to network security. Therefore, packet...
The Internet today is beset with constant attacks targeting users and infrastructure. One popular me...
Darknets are ranges of IP addresses advertised without answering any traffic. Darknets help to uncov...
A supervisory control and data acquisition (SCADA) system may be subject to integrity attacks. Anoma...
This thesis seeks to use knowledge of Internet addressing to improve Internet security. Its goal is ...
In this paper, we consider the problem of detecting an intruding packet in a communication network. ...
In this thesis, we consider the problems of detecting intrusions initiated by cooperative malicious ...
Abstract—Effective mitigation of denial of service (DoS) attack is a press-ing problem on the Intern...
We exploit for defensive purposes the concept of darkports - the unused ports on active systems. We ...
Abstract. Existing low-latency anonymity networks are vulnerable to traffic analysis, so location di...
There is currently an urgent need for effective solutions against distributed denial-of-service (DDo...
Distributed Denial of Service (DDoS) is one of the most difficult security problems to address. Whil...
Botnets pose a serious threat to the health of the Internet. Most current network-based botnet detec...
Recently there has been heightened, continuous, and intrusive activity by remotely located rogue hac...
AbstractThis paper presents a machine learning approach to large-scale monitoring for malicious acti...
Abstract—Malware and botnets pose a steady and growing threat to network security. Therefore, packet...
The Internet today is beset with constant attacks targeting users and infrastructure. One popular me...
Darknets are ranges of IP addresses advertised without answering any traffic. Darknets help to uncov...
A supervisory control and data acquisition (SCADA) system may be subject to integrity attacks. Anoma...
This thesis seeks to use knowledge of Internet addressing to improve Internet security. Its goal is ...
In this paper, we consider the problem of detecting an intruding packet in a communication network. ...
In this thesis, we consider the problems of detecting intrusions initiated by cooperative malicious ...
Abstract—Effective mitigation of denial of service (DoS) attack is a press-ing problem on the Intern...
We exploit for defensive purposes the concept of darkports - the unused ports on active systems. We ...
Abstract. Existing low-latency anonymity networks are vulnerable to traffic analysis, so location di...
There is currently an urgent need for effective solutions against distributed denial-of-service (DDo...
Distributed Denial of Service (DDoS) is one of the most difficult security problems to address. Whil...
Botnets pose a serious threat to the health of the Internet. Most current network-based botnet detec...
Recently there has been heightened, continuous, and intrusive activity by remotely located rogue hac...
AbstractThis paper presents a machine learning approach to large-scale monitoring for malicious acti...