The Missing Link in Network Intrusion Detection: Taking AI/ML Research Efforts to Users
K Dietz, M Mühlhauser, J Kögel, S Schwinger… - IEEE …, 2024 - ieeexplore.ieee.org
Intrusion Detection Systems (IDS) tackle the challenging task of detecting network attacks as
fast as possible. As this is getting more complex in modern enterprise networks, Artificial …
fast as possible. As this is getting more complex in modern enterprise networks, Artificial …
On the vulnerability of anti-malware solutions to DNS attacks
Anti-malware agents typically communicate with their remote services to share information
about suspicious files. These remote services use their up-to-date information and global …
about suspicious files. These remote services use their up-to-date information and global …
Global Analysis with Aggregation-based Beaconing Detection across Large Campus Networks
We present a new approach to effectively detect and prioritize malicious beaconing activities
in large campus networks by profiling the server activities through aggregated signals …
in large campus networks by profiling the server activities through aggregated signals …
Towards a webshell detection approach using rule-based and deep http traffic analysis
Web applications are highly vulnerable to injecting malicious code (webshell) attacks. The
static analysis is considered the best method to detect webshells. However, this method …
static analysis is considered the best method to detect webshells. However, this method …
[PDF][PDF] Novel Techniques for Detecting Tor Botnets
O Fajana - 2023 - researchportal.port.ac.uk
Botnets are collections of infected computers that are controlled centrally by a botmaster,
often for sending spam or launching denial of service attacks. The task of taking down these …
often for sending spam or launching denial of service attacks. The task of taking down these …
[PDF][PDF] The Missing Link in Network Intrusion Detection: Taking AI/ML Research Efforts to Users
J KÖGEL, S SCHWINGER, M SICHERMANN - 2024 - opus.bibliothek.uni-augsburg.de
ABSTRACT Intrusion Detection Systems (IDS) tackle the challenging task of detecting
network attacks as fast as possible. As this is getting more complex in modern enterprise …
network attacks as fast as possible. As this is getting more complex in modern enterprise …
Human-and Machine-Generated Traffic Distinction by DNS Protocol Analysis
M Ochab, M Mrukowicz, J Sarzyński… - … Conference on Fuzzy …, 2021 - ieeexplore.ieee.org
In this contribution we analyze a real DNS traffic collected at the University of Rzeszów
campus. All DNS queries and responses observed in the entire network were gathered …
campus. All DNS queries and responses observed in the entire network were gathered …
[PDF][PDF] KYBERNETICKÉ HROZBY V KOMUNIKACI DNS
PP PŮČEK - theses.cz
Cílem této práce je seznámit čtenáře s hrozbami, které se vyskytují v systému DNS, a
implementovat jejich detekci. V úvodu práce je provedena rešerše těchto hrozeb a získání …
implementovat jejich detekci. V úvodu práce je provedena rešerše těchto hrozeb a získání …
[PDF][PDF] VYSOKÉ UČENI TECHNICKE V BRNE
PP PUČEK - theses.cz
Cílem této práce je seznámit čtenáře s hrozbami, které se vyskytují v systému DNS, a im
plementovat jejich detekci. V úvodu práce je provedena rešerše těchto hrozeb a získání …
plementovat jejich detekci. V úvodu práce je provedena rešerše těchto hrozeb a získání …