Using side channel TCP features for real-time detection of malware connections
暂无分享,去创建一个
Dimitris Gritzalis | George Stergiopoulos | Nikolaos Tsalis | Georgia Chronopoulou | Evangelos Bitsikas | D. Gritzalis | G. Stergiopoulos | Nikolaos Tsalis | Georgia Chronopoulou | Evangelos Bitsikas
[1] Dimitris Gritzalis,et al. Automatic Detection of Various Malicious Traffic Using Side Channel Features on TCP Packets , 2018, ESORICS.
[2] Cristina Alcaraz,et al. Cyber Stealth Attacks in Critical Information Infrastructures , 2018, IEEE Systems Journal.
[3] Hui Xiong,et al. Effective and Real-time In-App Activity Analysis in Encrypted Internet Traffic Streams , 2017, KDD.
[4] Conrad Sanderson,et al. Armadillo: a template-based C++ library for linear algebra , 2016, J. Open Source Softw..
[5] Jakub Lokoc,et al. k-NN Classification of Malware in HTTPS Traffic Using the Metric Space Approach , 2016, PAISI.
[6] Michail Maniatakos,et al. The Cybersecurity Landscape in Industrial Control Systems , 2016, Proceedings of the IEEE.
[7] Jan Kohout,et al. Automatic discovery of web servers hosting similar applications , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).
[8] Cristina Alcaraz,et al. Context-Awareness Using Anomaly-Based Detectors for Smart Grid Domains , 2014, CRiSIS.
[9] David Kennedy,et al. Metasploit: The Penetration Tester's Guide , 2011 .
[10] Rui Wang,et al. Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow , 2010, 2010 IEEE Symposium on Security and Privacy.
[11] Vern Paxson,et al. Outside the Closed World: On Using Machine Learning for Network Intrusion Detection , 2010, 2010 IEEE Symposium on Security and Privacy.
[12] Michael K. Reiter,et al. Traffic Aggregation for Malware Detection , 2008, DIMVA.
[13] Charles V. Wright,et al. Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[14] Vinod Yegneswaran,et al. BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation , 2007, USENIX Security Symposium.
[15] Maurizio Dusi,et al. Traffic classification through simple statistical fingerprinting , 2007, CCRV.
[16] W. Timothy Strayer,et al. Using Machine Learning Techniques to Identify Botnet Traffic , 2006 .
[17] Suresh Singh,et al. An Algorithm for Anomaly-based Botnet Detection , 2006, SRUTI.
[18] Farnam Jahanian,et al. The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets , 2005, SRUTI.
[19] Konstantina Papagiannaki,et al. Structural analysis of network traffic flows , 2004, SIGMETRICS '04/Performance '04.
[20] Jim Alves-Foss,et al. NATE: Network Analysis of Anomalous Traffic Events, a low-cost approach , 2001, NSPW '01.
[21] Dawn Xiaodong Song,et al. Timing Analysis of Keystrokes and Timing Attacks on SSH , 2001, USENIX Security Symposium.