Rethinking data-driven networking with foundation models: challenges and opportunities

F Le, M Srivatsa, R Ganti, V Sekar - … of the 21st ACM Workshop on Hot …, 2022 - dl.acm.org
Foundational models have caused a paradigm shift in the way artificial intelligence (AI)
systems are built. They have had a major impact in natural language processing (NLP), and …

The SSL landscape: a thorough analysis of the x. 509 PKI using active and passive measurements

R Holz, L Braun, N Kammenhuber… - Proceedings of the 2011 …, 2011 - dl.acm.org
The SSL and TLS infrastructure used in important protocols like HTTPs and IMAPs is built on
an X. 509 public-key infrastructure (PKI). X. 509 certificates are thus used to authenticate …

[PDF][PDF] Nazca: Detecting Malware Distribution in Large-Scale Networks.

L Invernizzi, S Miskovic, R Torres, C Kruegel, S Saha… - NDSS, 2014 - cs.umd.edu
Malware remains one of the most significant security threats on the Internet. Antivirus
solutions and blacklists, the main weapons of defense against these attacks, have only been …

Analysis of SSL certificate reissues and revocations in the wake of Heartbleed

L Zhang, D Choffnes, D Levin, T Dumitraş… - Proceedings of the …, 2014 - dl.acm.org
Central to the secure operation of a public key infrastructure (PKI) is the ability to revoke
certificates. While much of users' security rests on this process taking place quickly, in …

Efficient querying and maintenance of network provenance at internet-scale

W Zhou, M Sherr, T Tao, X Li, BT Loo… - Proceedings of the 2010 …, 2010 - dl.acm.org
Network accountability, forensic analysis, and failure diagnosis are becoming increasingly
important for network management and security. Such capabilities often utilize network …

Linguistics for Crimes in the World by AI-Based Cyber Security

MHB Abd Alkareem, FQ Nasif… - … Approaches in Smart …, 2023 - ieeexplore.ieee.org
Effective communication and comprehension of cyber threats in varied linguistic contexts are
crucial for robust defense mechanisms in the ever-changing global cybersecurity scene …

On high-speed flow-based intrusion detection using snort-compatible signatures

F Erlacher, F Dressler - IEEE Transactions on Dependable and …, 2020 - ieeexplore.ieee.org
Signature-based Network Intrusion Detection Systems (NIDS) have become state-of-the-art
in modern network security solutions. However, most systems are not designed for modern …

Cloud computing-based forensic analysis for collaborative network security management system

Z Chen, F Han, J Cao, X Jiang… - Tsinghua science and …, 2013 - ieeexplore.ieee.org
Internet security problems remain a major challenge with many security concerns such as
Internet worms, spam, and phishing attacks. Botnets, well-organized distributed network …

IoT-based fall detection for smart home environments

S Greene, H Thapliyal… - 2016 IEEE international …, 2016 - ieeexplore.ieee.org
The rise of internet connected devices has enabledthe home with a vast amount of
enhancements to make lifemore convenient. These internet connected devices can be used …

Enriching network security analysis with time travel

G Maier, R Sommer, H Dreger, A Feldmann… - Proceedings of the …, 2008 - dl.acm.org
In many situations it can be enormously helpful to archive the raw contents of a network
traffic stream to disk, to enable later inspection of activity that becomes interesting only in …