T Zhang, X Wang, Z Li, F Guo, Y Ma… - Science China Information …, 2017 - Springer
Network anomaly analysis is an emerging subtopic of network security. Network anomaly refers to the unusual behavior of network devices or suspicious network status. A number of …
As the malware research field became more established over the last two decades, new research questions arose, such as how to make malware research reproducible, how to …
M Sutton - US Patent 8,413,238, 2013 - Google Patents
Systems, methods and apparatus for a distributed security that monitors communications to identify access attempts to/from darknet addresses. Such attempts can be inferred to be asso …
This paper presents a new approach to infer worldwide malware-infected machines by solely analyzing their generated probing activities. In contrary to other adopted methods, the …
D Inoue, M Eto, K Suzuki, M Suzuki… - Proceedings of the ninth …, 2012 - dl.acm.org
A darknet is a set of unused IP addresses whose monitoring is an effective way of detecting malicious activities on the Internet. We have developed an alert system called DAEDALUS …
In this paper, we present three datasets that have been built from network traffic traces using ASNM (Advanced Security Network Metrics) features, designed in our previous work. The …
Abstract Cyber Threat Intelligence (CTI) plays an indispensable role in providing evidence- based knowledge to plan defensive strategies against advanced cyber attacks. Most threat …
During November 2013, the operational cyber/network security community reported an unprecedented increase of traffic originating from source port 0. This event was deemed as …
Considering rapid increase of recent highly organized and sophisticated malwares, practical solutions for the countermeasures against malwares especially related to zero-day attacks …