A survey of moving target defenses for network security

S Sengupta, A Chowdhary, A Sabur… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Network defenses based on traditional tools, techniques, and procedures (TTP) fail to
account for the attacker's inherent advantage present due to the static nature of network …

[PDF][PDF] A survey on honeypot software and data analysis

M Nawrocki, M Wählisch, TC Schmidt, C Keil… - arXiv preprint arXiv …, 2016 - arxiv.org
A Survey on Honeypot Software and Data Analysis Page 1 A Survey on Honeypot Software and
Data Analysis Marcin Nawrocki ∗ , Matthias Wählisch ∗ , Thomas C. Schmidt † , Christian Keil ‡ …

Use of security logs for data leak detection: a systematic literature review

R Ávila, R Khoury, R Khoury… - Security and …, 2021 - Wiley Online Library
Security logs are widely used to monitor data, networks, and computer activities. By
analyzing them, security experts can pick out anomalies that reveal the presence of cyber …

A labeled data set for flow-based intrusion detection

A Sperotto, R Sadre, F Van Vliet, A Pras - IP Operations and Management …, 2009 - Springer
Flow-based intrusion detection has recently become a promising security mechanism in
high speed networks (1-10 Gbps). Despite the richness in contributions in this field …

Privacy preserving clustering

S Jha, L Kruger, P McDaniel - … : 10th European Symposium on Research in …, 2005 - Springer
The freedom and transparency of information flow on the Internet has heightened concerns
of privacy. Given a set of data items, clustering algorithms group similar items together …

Predicting cyber attack rates with extreme values

Z Zhan, M Xu, S Xu - IEEE Transactions on Information …, 2015 - ieeexplore.ieee.org
It is important to understand to what extent, and in what perspectives, cyber attacks can be
predicted. Despite its evident importance, this problem was not investigated until very …

An Architecture for Generating Semantic Aware Signatures.

V Yegneswaran, JT Giffin, P Barford, S Jha - USENIX security symposium, 2005 - usenix.org
Identifying new intrusions and developing effective signatures that detect them is essential
for protecting computer networks. We present Nemean, a system for automatic generation of …

[图书][B] Honeypots: a new paradigm to information security

RC Joshi, A Sardana - 2011 - books.google.com
A well-rounded, accessible exposition of honeypots in wired and wireless networks, this
book addresses the topic from a variety of perspectives. Following a strong theoretical …

Profiling attacker behavior following SSH compromises

D Ramsbrock, R Berthier… - 37th Annual IEEE/IFIP …, 2007 - ieeexplore.ieee.org
This practical experience report presents the results of an experiment aimed at building a
profile of attacker behavior following a remote compromise. For this experiment, we utilized …

[HTML][HTML] A framework for attack patterns' discovery in honeynet data

O Thonnard, M Dacier - digital investigation, 2008 - Elsevier
Collecting data related to Internet threats has now become a relatively common task for
security researchers and network operators. However, the huge amount of raw data can …