In recent years we have witnessed several complex and high-impact attacks specifically targeting binary protocols (RPC, Samba and, more recently, RDP). These attacks could not be detected by current – signature-based – detection solutions, while – at least in theory – they could be detected by state-of-the-art anomaly-based systems. This raises once again the still unanswered question of how effective anomaly-based systems are in practice. To contribute to answering this question, in this paper we investigate the effectiveness of a widely studied category of network intrusion detection systems: anomaly-based algorithms using n-gram analysis for payload inspection. Specifically, we present a thorough analysis and evaluation of several dete...
Abstract: New datamining techniques are developed for generating frequent episode rules of traffic e...
Abstract — Signature-based malicious code detection is the standard technique in all commercial anti...
Abstract. Intrusion detection corresponds to a suite of techniques that can be used to identify atta...
In recent years we have witnessed several complex and high-impact attacks specifically targeting “bi...
In recent years we have witnessed several complex and high-impact attacks specifically targeting "bi...
Detection methods based on n-gram models have been widely studied for the identication of attacks an...
Distributed denial of service (DDoS) attacks have always been a concern of cyber experts. To detect ...
Distributed denial of service (DDoS) attacks have always been a concern of cyber experts. To detect ...
Previous research has shown that byte level analysis of HTTP traffic offers a practical solution to ...
Web applications that generate malicious HTTP requests provide a platform that attackers use to expl...
Information systems and their services (referred to as cyberspace) are ubiquitous and touch all aspe...
We identify a new method for detecting malware within a network that can be processed in linear time...
Network servers are vulnerable to attack, and this state of affairs shows no sign of abating. Theref...
Inter and intra-network connectivity have become a useful resource for accessibility and flexibility...
Abstract — Signature-based malicious code detection is the standard technique in all commercial anti...
Abstract: New datamining techniques are developed for generating frequent episode rules of traffic e...
Abstract — Signature-based malicious code detection is the standard technique in all commercial anti...
Abstract. Intrusion detection corresponds to a suite of techniques that can be used to identify atta...
In recent years we have witnessed several complex and high-impact attacks specifically targeting “bi...
In recent years we have witnessed several complex and high-impact attacks specifically targeting "bi...
Detection methods based on n-gram models have been widely studied for the identication of attacks an...
Distributed denial of service (DDoS) attacks have always been a concern of cyber experts. To detect ...
Distributed denial of service (DDoS) attacks have always been a concern of cyber experts. To detect ...
Previous research has shown that byte level analysis of HTTP traffic offers a practical solution to ...
Web applications that generate malicious HTTP requests provide a platform that attackers use to expl...
Information systems and their services (referred to as cyberspace) are ubiquitous and touch all aspe...
We identify a new method for detecting malware within a network that can be processed in linear time...
Network servers are vulnerable to attack, and this state of affairs shows no sign of abating. Theref...
Inter and intra-network connectivity have become a useful resource for accessibility and flexibility...
Abstract — Signature-based malicious code detection is the standard technique in all commercial anti...
Abstract: New datamining techniques are developed for generating frequent episode rules of traffic e...
Abstract — Signature-based malicious code detection is the standard technique in all commercial anti...
Abstract. Intrusion detection corresponds to a suite of techniques that can be used to identify atta...