Characterizing honeypot-captured cyber attacks: Statistical framework and case study

Z Zhan, M Xu, S Xu - IEEE Transactions on Information …, 2013 - ieeexplore.ieee.org
Rigorously characterizing the statistical properties of cyber attacks is an important problem.
In this paper, we propose the first statistical framework for rigorously analyzing honeypot …

Detecting botnets using command and control traffic

B AsSadhan, JMF Moura, D Lapsley… - 2009 Eighth IEEE …, 2009 - ieeexplore.ieee.org
Botnets pose a significant threat to network-based applications and communications; it is
believed that 16-25% of the computers connected to the Internet are members of a botnet …

[HTML][HTML] An efficient method to detect periodic behavior in botnet traffic by analyzing control plane traffic

B AsSadhan, JMF Moura - Journal of advanced research, 2014 - Elsevier
Botnets are large networks of bots (compromised machines) that are under the control of a
small number of bot masters. They pose a significant threat to Internet's communications and …

Anomaly detection based on LRD behavior analysis of decomposed control and data planes network traffic using SOSS and FARIMA models

B AsSadhan, K Zeb, J Al-Muhtadi, S Alshebeili - IEEE Access, 2017 - ieeexplore.ieee.org
The detection of anomalies in network traffic, such as low volume attacks and abnormalities,
has become a pressing problem in today's large volume of Internet traffic. To this end …

Mining recurrent activities: Fourier analysis of change events

A Hindle, MW Godfrey, RC Holt - 2009 31st International …, 2009 - ieeexplore.ieee.org
Within the field of software repository mining, it is common practice to extract change-events
from source control systems and then abstract these events to allow for different analyses …

Volume based anomaly detection using LRD analysis of decomposed network traffic

K Zeb, B AsSadhan, J Al-Muhtadi… - Fourth edition of the …, 2014 - ieeexplore.ieee.org
Network traffic intrusions increase day by day in computer systems. This poses major
security threats to computer networks. In this paper, we present an effective approach for …

Anomaly detection using Wavelet-based estimation of LRD in packet and byte count of control traffic

K Zeb, B AsSadhan, J Al-Muhtadi… - 2016 7th International …, 2016 - ieeexplore.ieee.org
The detection of anomalous behavior such as low volume attacks and abnormalities in
today's large volume of Internet traffic has become a challenging problem in the network …

[HTML][HTML] Network traffic analysis through statistical signal processing methods

BA AsSadhan - 2009 - search.proquest.com
Network traffic analysis through statistical signal processing methods Network traffic analysis
through statistical signal processing methods Abstract In this thesis, we address three major …

[PDF][PDF] Manuscript Title

B AsSadhan, JMF Moura - 2013 - researchgate.net
Botnets are large networks of bots (compromised machines) that are under the control of a
small number of bot masters. They pose a significant threat to Internet's communications and …

[引用][C] Anomaly Detection Based on LRD Behavior Analysis of Decomposed Control and Data Planes Network Traffic Using SOSS and FARIMA Models

A ATLAS, K ZEB, J AL-MUHTADI, S ALSHEBEILI