[HTML][HTML] Ransomware early detection by the analysis of file sharing traffic

D Morato, E Berrueta, E Magaña, M Izal - Journal of Network and Computer …, 2018 - Elsevier
Crypto ransomware is a type of malware that locks access to user files by encrypting them
and demands a ransom in order to obtain the decryption key. This type of malware has …

Commodity packet capture engines: Tutorial, cookbook and applicability

V Moreno, J Ramos, PMS del Río… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Users' demands have dramatically increased due to widespread availability of broadband
access and new Internet avenues for accessing, sharing and working with information. In …

Network traffic processing with PFQ

N Bonelli, S Giordano, G Procissi - IEEE Journal on Selected …, 2016 - ieeexplore.ieee.org
This paper presents Packet Family Queue (PFQ), a high-performance framework for packet
processing designed to flexibly handle network applications parallelism and making traffic …

Optimality of a Network Monitoring Agent and Validation in a Real Probe

L Zabala, J Doncel, A Ferro - Mathematics, 2023 - mdpi.com
The evolution of commodity hardware makes it possible to use this type of equipment to
implement traffic monitoring systems. A preliminary empirical evaluation of a network traffic …

Performance assessment of 40 Gbit/s off-the-shelf network cards for virtual network probes in 5G networks

R Leira, G Julián-Moreno, I González… - Computer Networks, 2019 - Elsevier
Incoming 5G networks will evolve regarding how they operate due to the use of virtualization
technologies. Network functions that are necessary for communication will be virtual and will …

Modeling a Linux Packet-Capturing System with a Queueing System with Vacations

L Zabala, J Doncel, A Ferro - Mathematics, 2023 - mdpi.com
Monitoring the evolution of the state of networks is an important issue to ensure that many
applications provide the required quality of service. The first step in network-monitoring …

Packet Fan-Out Extension for the pcap Library

N Bonelli, F Del Vigna, S Giordano… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
The large availability of multi-gigabit network cards for commodity PCs requires network
applications to potentially cope with high volumes of traffic. However, computation intensive …

Testing the capacity of off-the-shelf systems to store 10gbe traffic

V Moreno, J Ramos, JL García-Dorado… - IEEE …, 2015 - ieeexplore.ieee.org
The maturity of the telecommunications market and the fact that user demands increase
every day leaves network operators no option but to deploy high-speed infrastructures and …

ANTI: An Adaptive Network Traffic Indexing Algorithm for High-Speed Networks

J Chen, X Chen, L Chen, X Lan… - GLOBECOM 2023-2023 …, 2023 - ieeexplore.ieee.org
Network packets record communication behaviors and details, which is important for security
audits, attack detection, and forensic analysis. For the effectiveness and timeliness of …

An effective payload attribution scheme for Cybercriminal detection using compressed bitmap index tables and traffic Downsampling

SM Hosseini, AH Jahangir - IEEE Transactions on Information …, 2017 - ieeexplore.ieee.org
Payload attribution systems (PAS) are one of the most important tools of network forensics
for detecting an offender after the occurrence of a cybercrime. A PAS stores the network …