Networking for big data: A survey
Complementary to the fancy big data applications, networking for big data is an
indispensable supporting platform for these applications in practice. This emerging research …
indispensable supporting platform for these applications in practice. This emerging research …
Security data collection and data analytics in the internet: A survey
Attacks over the Internet are becoming more and more complex and sophisticated. How to
detect security threats and measure the security of the Internet arises a significant research …
detect security threats and measure the security of the Internet arises a significant research …
Vigilante: End-to-end containment of internet worms
Worm containment must be automatic because worms can spread too fast for humans to
respond. Recent work has proposed network-level techniques to automate worm …
respond. Recent work has proposed network-level techniques to automate worm …
Method and system for detecting malicious and/or botnet-related domain names
R Perdisci, W Lee - US Patent 10,027,688, 2018 - Google Patents
A method and system of detecting a malicious and/or botnet-related domain name,
comprising: reviewing a domain name used in Domain Name System (DNS) traffic in a …
comprising: reviewing a domain name used in Domain Name System (DNS) traffic in a …
Method and system for detecting and responding to attacking networks
D Dagon, N Feamster, W Lee, R Edmonds… - US Patent …, 2013 - Google Patents
A system and method for detecting a first network of compromised computers in a second
network of computers, comprising: collecting Domain Name System (DNS) data for the …
network of computers, comprising: collecting Domain Name System (DNS) data for the …
Systems and methods for detecting and inhibiting attacks using honeypots
S Sidiroglou, AD Keromytis… - US Patent 7,904,959, 2011 - Google Patents
In accordance with some embodiments, systems and methods that protect an application
from attacks are provided. In some embodiments, traffic from a communication network is …
from attacks are provided. In some embodiments, traffic from a communication network is …
Model-based evaluation: from dependability to security
DM Nicol, WH Sanders… - IEEE Transactions on …, 2004 - ieeexplore.ieee.org
The development of techniques for quantitative, model-based evaluation of computer system
dependability has a long and rich history. A wide array of model-based evaluation …
dependability has a long and rich history. A wide array of model-based evaluation …
An advanced hybrid peer-to-peer botnet
A “botnet” consists of a network of compromised computers controlled by an attacker
(“botmaster”). Recently, botnets have become the root cause of many Internet attacks. To be …
(“botmaster”). Recently, botnets have become the root cause of many Internet attacks. To be …
Defending against hitlist worms using network address space randomization
Worms are self-replicating malicious programs that represent a major security threat for the
Internet, as they can infect and damage a large number of vulnerable hosts at timescales …
Internet, as they can infect and damage a large number of vulnerable hosts at timescales …