Using Bayesian networks for probabilistic identification of zero-day attack paths

X Sun, J Dai, P Liu, A Singhal… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Enforcing a variety of security measures (such as intrusion detection systems, and so on)
can provide a certain level of protection to computer networks. However, such security …

[图书][B] NSDMiner: Automated discovery of network service dependencies

A Natarajan, P Ning, Y Liu, S Jajodia, SE Hutchinson - 2012 - ieeexplore.ieee.org
Enterprise networks today host a wide variety of network services, which often depend on
each other to provide and support network-based services and applications. Understanding …

Rippler: Delay injection for service dependency detection

A Zand, G Vigna, R Kemmerer… - IEEE INFOCOM 2014 …, 2014 - ieeexplore.ieee.org
Detecting dependencies among network services has been well-studied in previous
research. These attempts at service dependency detection fall into two classes: active and …

Deep mining port scans from darknet

S Lagraa, Y Chen, J François - International Journal of Network …, 2019 - Wiley Online Library
TCP/UDP port scanning or sweeping is one of the most common technique used by
attackers to discover accessible and potentially vulnerable hosts and applications. Although …

On the accurate identification of network service dependencies in distributed systems

B Peddycord III, P Ning, S Jajodia - 26th Large Installation System …, 2012 - usenix.org
The automated identification of network service dependencies remains a challenging
problem in the administration of large distributed systems. Advances in developing solutions …

Discovering service dependencies in mobile ad hoc networks

P Novotny, AL Wolf, BJ Ko - 2013 IFIP/IEEE International …, 2013 - ieeexplore.ieee.org
The combination of service-oriented applications, with their run-time service binding, and
mobile ad hoc networks, with their transient communication topologies, brings a new level of …

On-demand discovery of software service dependencies in MANETs

P Novotny, BJ Ko, AL Wolf - IEEE Transactions on Network and …, 2015 - ieeexplore.ieee.org
The dependencies among the components of service-oriented software applications hosted
in a mobile ad hoc network (MANET) are difficult to determine due to the inherent loose …

Mining semantic relations using NetFlow

A Caracas, A Kind, D Gantenbein… - 2008 3rd IEEE/IFIP …, 2008 - ieeexplore.ieee.org
Knowing the dependencies among computing assets and services provides insights into the
computing and business landscape, therefore, facilitating low-risk timely changes in support …

Enterprise-level cyber situation awareness

X Sun, J Dai, A Singhal, P Liu - Theory and models for cyber situation …, 2017 - Springer
This chapter begins with a literature review of situation awareness (SA) concepts, and a
study on how to apply SA to the cyber field for enterprise-level network security diagnosis …

[PDF][PDF] Fault localization in service-based systems hosted in mobile ad hoc networks

P Novotny - 2013 - wwwhomes.doc.ic.ac.uk
Fault localization in general refers to a technique for identifying the likely root causes of
failures observed in systems formed from components. Fault localization in systems …