Revisiting traffic anomaly detection using software defined networking

SA Mehdi, J Khalid, SA Khayam - … , RAID 2011, Menlo Park, CA, USA …, 2011 - Springer
Despite their exponential growth, home and small office/home office networks continue to be
poorly managed. Consequently, security of hosts in most home networks is easily …

Surveying port scans and their detection methodologies

MH Bhuyan, DK Bhattacharyya… - The Computer …, 2011 - academic.oup.com
Scanning of ports on a computer occurs frequently on the Internet. An attacker performs port
scans of Internet protocol addresses to find vulnerable hosts to compromise. However, it is …

[PDF][PDF] Computer worms: Architectures, evasion strategies, and detection mechanisms

C Smith, A Matrawy, S Chow, B Abdelaziz - Journal of Information …, 2009 - Citeseer
This paper surveys the Internet worms-related literature and how stealthy worm behaviour
can be discovered. Discussion is provided on the anatomy of worms, specifically covering …

Fast compact city modeling for navigation pre-visualization

N Cornelis, K Cornelis… - 2006 IEEE Computer …, 2006 - ieeexplore.ieee.org
Nowadays, GPS-based car navigation systems mainly use speech and aerial views of
simplified road maps to guide drivers to their destination. However, drivers often experience …

Network forensics based on fuzzy logic and expert system

N Liao, S Tian, T Wang - Computer Communications, 2009 - Elsevier
Network forensics is a research area that finds the malicious users by collecting and
analyzing the intrusion or infringement evidence of computer crimes such as hacking. In the …

Survey on incremental approaches for network anomaly detection

MH Bhuyan, DK Bhattacharyya, JK Kalita - arXiv preprint arXiv:1211.4493, 2012 - arxiv.org
As the communication industry has connected distant corners of the globe using advances
in network technology, intruders or attackers have also increased attacks on networking …

{PrivateEye}: Scalable and {Privacy-Preserving} Compromise Detection in the Cloud

B Arzani, S Ciraci, S Saroiu, A Wolman… - … USENIX Symposium on …, 2020 - usenix.org
Today, it is difficult for operators to detect compromised VMs in their data centers (DCs).
Despite their benefits, the compromise detection systems operators offer are mostly unused …

Information theoretic feature space slicing for statistical anomaly detection

AB Ashfaq, S Rizvi, M Javed, SA Khayam… - Journal of Network and …, 2014 - Elsevier
Anomaly detection accuracy has been a serious limitation in commercial ADS deployments.
A main reason for this limitation is the expectation that an ADS should achieve very high …

A comparative study of two network-based anomaly detection methods

K Nyalkalkar, S Sinhay, M Bailey… - 2011 Proceedings IEEE …, 2011 - ieeexplore.ieee.org
Modern networks are complex and hence, network operators often rely on automation to
assist in assuring the security, availability, and performance of these networks. At the core of …

A novel stealthy attack to gather SDN configuration-information

M Conti, F De Gaspari… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Software Defined Networking (SDN) is a recent network architecture based on the
separation of forwarding functions from network logic, and provides high flexibility in the …