A survey of data mining and machine learning methods for cyber security intrusion detection

AL Buczak, E Guven - IEEE Communications surveys & tutorials, 2015 - ieeexplore.ieee.org
This survey paper describes a focused literature survey of machine learning (ML) and data
mining (DM) methods for cyber analytics in support of intrusion detection. Short tutorial …

[PDF][PDF] An overview of image steganography.

T Morkel, JHP Eloff, MS Olivier - ISSA, 2005 - academia.edu
Steganography is the art of hiding the fact that communication is taking place, by hiding
information in other information. Many different carrier file formats can be used, but digital …

Method, system and computer program product for detecting at least one of security threats and undesirable computer files

KR Borders - US Patent 9,055,093, 2015 - Google Patents
US9055093B2 - Method, system and computer program product for detecting at least one of
security threats and undesirable computer files - Google Patents US9055093B2 - Method …

A survey of covert channels and countermeasures in computer network protocols

S Zander, G Armitage, P Branch - … Communications Surveys & …, 2007 - ieeexplore.ieee.org
Covert channels are used for the secret transfer of information. Encryption only protects
communication from being decoded by unauthorised parties, whereas covert channels aim …

A hybrid machine learning approach to network anomaly detection

T Shon, J Moon - Information Sciences, 2007 - Elsevier
Zero-day cyber attacks such as worms and spy-ware are becoming increasingly widespread
and dangerous. The existing signature-based intrusion detection mechanisms are often not …

IP covert timing channels: design and detection

S Cabuk, CE Brodley, C Shields - … of the 11th ACM conference on …, 2004 - dl.acm.org
A network covert channel is a mechanism that can be used to leak information across a
network in violation of a security policy and in a manner that can be difficult to detect. In this …

A review on machine learning–based approaches for Internet traffic classification

O Salman, IH Elhajj, A Kayssi, A Chehab - Annals of Telecommunications, 2020 - Springer
Traffic classification acquired the interest of the Internet community early on. Different
approaches have been proposed to classify Internet traffic to manage both security and …

An exploration of L2 cache covert channels in virtualized environments

Y Xu, M Bailey, F Jahanian, K Joshi… - Proceedings of the 3rd …, 2011 - dl.acm.org
Recent exploration into the unique security challenges of cloud computing have shown that
when virtual machines belonging to different customers share the same physical machine …

Pattern-based survey and categorization of network covert channel techniques

S Wendzel, S Zander, B Fechner, C Herdin - ACM Computing Surveys …, 2015 - dl.acm.org
Network covert channels are used to hide communication inside network protocols. Various
techniques for covert channels have arisen in the past few decades. We surveyed and …

Embedding covert channels into TCP/IP

SJ Murdoch, S Lewis - International Workshop on Information Hiding, 2005 - Springer
It is commonly believed that steganography within TCP/IP is easily achieved by embedding
data in header fields seemingly filled with “random” data, such as the IP identifier, TCP initial …