The Missing Link in Network Intrusion Detection: Taking AI/ML Research Efforts to Users

K Dietz, M Mühlhauser, J Kögel, S Schwinger… - IEEE …, 2024 - ieeexplore.ieee.org
Intrusion Detection Systems (IDS) tackle the challenging task of detecting network attacks as
fast as possible. As this is getting more complex in modern enterprise networks, Artificial …

On the vulnerability of anti-malware solutions to DNS attacks

A Nadler, R Bitton, O Brodt, A Shabtai - Computers & Security, 2022 - Elsevier
Anti-malware agents typically communicate with their remote services to share information
about suspicious files. These remote services use their up-to-date information and global …

Global Analysis with Aggregation-based Beaconing Detection across Large Campus Networks

Y Zhang, H Dong, A Nottingham, M Buchanan… - Proceedings of the 39th …, 2023 - dl.acm.org
We present a new approach to effectively detect and prioritize malicious beaconing activities
in large campus networks by profiling the server activities through aggregated signals …

Towards a webshell detection approach using rule-based and deep http traffic analysis

HV Le, HV Vo, TN Nguyen, HN Nguyen… - International Conference …, 2022 - Springer
Web applications are highly vulnerable to injecting malicious code (webshell) attacks. The
static analysis is considered the best method to detect webshells. However, this method …

[PDF][PDF] Novel Techniques for Detecting Tor Botnets

O Fajana - 2023 - researchportal.port.ac.uk
Botnets are collections of infected computers that are controlled centrally by a botmaster,
often for sending spam or launching denial of service attacks. The task of taking down these …

[PDF][PDF] The Missing Link in Network Intrusion Detection: Taking AI/ML Research Efforts to Users

J KÖGEL, S SCHWINGER, M SICHERMANN - 2024 - opus.bibliothek.uni-augsburg.de
ABSTRACT Intrusion Detection Systems (IDS) tackle the challenging task of detecting
network attacks as fast as possible. As this is getting more complex in modern enterprise …

Human-and Machine-Generated Traffic Distinction by DNS Protocol Analysis

M Ochab, M Mrukowicz, J Sarzyński… - … Conference on Fuzzy …, 2021 - ieeexplore.ieee.org
In this contribution we analyze a real DNS traffic collected at the University of Rzeszów
campus. All DNS queries and responses observed in the entire network were gathered …

[PDF][PDF] KYBERNETICKÉ HROZBY V KOMUNIKACI DNS

PP PŮČEK - theses.cz
Cílem této práce je seznámit čtenáře s hrozbami, které se vyskytují v systému DNS, a
implementovat jejich detekci. V úvodu práce je provedena rešerše těchto hrozeb a získání …

[PDF][PDF] VYSOKÉ UČENI TECHNICKE V BRNE

PP PUČEK - theses.cz
Cílem této práce je seznámit čtenáře s hrozbami, které se vyskytují v systému DNS, a im
plementovat jejich detekci. V úvodu práce je provedena rešerše těchto hrozeb a získání …