Method and apparatus for detecting malware

B Abdel-Aziz, ST Chow, SL Chen - US Patent 8,112,801, 2012 - Google Patents
A method of detecting malware may include: a) examining header data in each PDU
transferred by a port of an access switch to identify PDUs transferred from a local network …

Malware detection system and method

S Chow, B Abdel-Aziz, F Khan - US Patent 8,181,249, 2012 - Google Patents
Methods and systems are presented for detection of malware such as worms in which a
network switch entices the malware into sending scan packets by allocating one or more …

Security issues in VoIP applications

PCK Hung, MV Martin - 2006 Canadian Conference on …, 2006 - ieeexplore.ieee.org
Recent voice over Internet protocol (VoIP) technology is attracting more and more attention
and interest in the industry. VoIP applications such as IP telephony systems involve sending …

A rough set approach for automatic key attributes identification of zero-day polymorphic worms

WC Sun, YM Chen - Expert Systems with Applications, 2009 - Elsevier
In recent years, given their rapid propagations, Internet worms increasingly threaten the
Internet hosts and services. It's worsen by the fact that zero-day polymorphic worms, which …

Method and system for identifying enterprise network hosts infected with slow and/or distributed scanning malware

B Abdel-Aziz, S Chow, SL Chen - US Patent 8,341,740, 2012 - Google Patents
Enterprise networks are found in a variety of businesses, government agencies, academic
institutions, and other orga nizations in which computer resources are shared and inter …

Toward sound-assisted intrusion detection systems

L Qi, M Vargas Martin, B Kapralos, M Green… - On the Move to …, 2007 - Springer
Network intrusion detection has been generally dealt with using sophisticated software and
statistical analysis, although sometimes it has to be done by administrators, either by …

[PDF][PDF] Through the looking glass: Security issues in VoIP applications

PCK Hung, MV Martin - Proceedings of the IADIS International Conference …, 2006 - Citeseer
ABSTRACT Recent Voice over Internet Protocol (VoIP) technology is attracting more and
more attention and interest in the industry. VoIP applications such as IP telephony systems …

Towards multimodal interfaces for intrusion detection

MA Garcia-Ruiz, B Kapralos, M Vargas Martin - Audio Engineering Society …, 2007 - aes.org
Network intrusion detection has been generally dealt with sophisticated software and
statistical analysis, although sometimes it has to be done by administrators, either by …

Regular and almost universal hashing: an efficient implementation

D Ivanchykhin, S Ignatchenko… - Software: Practice and …, 2017 - Wiley Online Library
Random hashing can provide guarantees regarding the performance of data structures such
as hash tables–even in an adversarial setting. Many existing families of hash functions are …

Intelligent network security assessment with modeling and analysis of attack patterns

S Kondakci - Security and communication networks, 2012 - Wiley Online Library
This paper presents a new concept for information security assessments while promoting
several areas of its application. Threat generation, attack pattern analysis, quantitative risk …