Networking for big data: A survey

S Yu, M Liu, W Dou, X Liu… - … Communications Surveys & …, 2016 - ieeexplore.ieee.org
Complementary to the fancy big data applications, networking for big data is an
indispensable supporting platform for these applications in practice. This emerging research …

Security data collection and data analytics in the internet: A survey

X Jing, Z Yan, W Pedrycz - IEEE Communications Surveys & …, 2018 - ieeexplore.ieee.org
Attacks over the Internet are becoming more and more complex and sophisticated. How to
detect security threats and measure the security of the Internet arises a significant research …

Vigilante: End-to-end containment of internet worms

M Costa, J Crowcroft, M Castro, A Rowstron… - Proceedings of the …, 2005 - dl.acm.org
Worm containment must be automatic because worms can spread too fast for humans to
respond. Recent work has proposed network-level techniques to automate worm …

Method and system for detecting malicious and/or botnet-related domain names

R Perdisci, W Lee - US Patent 10,027,688, 2018 - Google Patents
A method and system of detecting a malicious and/or botnet-related domain name,
comprising: reviewing a domain name used in Domain Name System (DNS) traffic in a …

Method and system for detecting and responding to attacking networks

D Dagon, N Feamster, W Lee, R Edmonds… - US Patent …, 2013 - Google Patents
A system and method for detecting a first network of compromised computers in a second
network of computers, comprising: collecting Domain Name System (DNS) data for the …

Systems and methods for detecting and inhibiting attacks using honeypots

S Sidiroglou, AD Keromytis… - US Patent 7,904,959, 2011 - Google Patents
In accordance with some embodiments, systems and methods that protect an application
from attacks are provided. In some embodiments, traffic from a communication network is …

Model-based evaluation: from dependability to security

DM Nicol, WH Sanders… - IEEE Transactions on …, 2004 - ieeexplore.ieee.org
The development of techniques for quantitative, model-based evaluation of computer system
dependability has a long and rich history. A wide array of model-based evaluation …

An advanced hybrid peer-to-peer botnet

P Wang, S Sparks, CC Zou - IEEE Transactions on Dependable …, 2008 - ieeexplore.ieee.org
A “botnet” consists of a network of compromised computers controlled by an attacker
(“botmaster”). Recently, botnets have become the root cause of many Internet attacks. To be …

[PDF][PDF] Modeling Botnet Propagation Using Time Zones.

D Dagon, CC Zou, W Lee - NDSS, 2006 - priv.gg
Time zones play an important and unexplored role in malware epidemics. To understand
how time and location affect malware spread dynamics, we studied botnets, or large …

Defending against hitlist worms using network address space randomization

S Antonatos, P Akritidis, EP Markatos… - Proceedings of the …, 2005 - dl.acm.org
Worms are self-replicating malicious programs that represent a major security threat for the
Internet, as they can infect and damage a large number of vulnerable hosts at timescales …