A survey of visualization systems for network security

H Shiravi, A Shiravi, AA Ghorbani - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
Security Visualization is a very young term. It expresses the idea that common visualization
techniques have been designed for use cases that are not supportive of security-related …

Preserving the privacy of sensitive relationships in graph data

E Zheleva, L Getoor - International workshop on privacy, security, and trust …, 2007 - Springer
In this paper, we focus on the problem of preserving the privacy of sensitive relationships in
graph data. We refer to the problem of inferring sensitive relationships from anonymized …

Embark: Securely outsourcing middleboxes to the cloud

C Lan, J Sherry, RA Popa, S Ratnasamy… - 13th USENIX Symposium …, 2016 - usenix.org
It is increasingly common for enterprises and other organizations to outsource network
processing to the cloud. For example, enterprises may outsource firewalling, caching, and …

Sanitizable signatures

G Ateniese, DH Chou, B De Medeiros… - … Security–ESORICS 2005 …, 2005 - Springer
We introduce the notion of sanitizable signatures that offer many attractive security features
for certain current and emerging applications. A sanitizable signature allows authorized …

The devil and packet trace anonymization

R Pang, M Allman, V Paxson, J Lee - ACM SIGCOMM Computer …, 2006 - dl.acm.org
Releasing network measurement data---including packet traces---to the research community
is a virtuous activity that promotes solid research. However, in practice, releasing …

Towards automated protocol reverse engineering using semantic information

G Bossert, F Guihéry, G Hiet - Proceedings of the 9th ACM symposium …, 2014 - dl.acm.org
Network security products, such as NIDS or application firewalls, tend to focus on application
level communication flows. However, adding support for new proprietary and often …

Strategies for sound internet measurement

V Paxson - Proceedings of the 4th ACM SIGCOMM Conference on …, 2004 - dl.acm.org
Conducting an Internet measurement study in a sound fashion can be much more difficult
than it might first appear. We present a number of strategies drawn from experiences for …

Differentially-private network trace analysis

F McSherry, R Mahajan - ACM SIGCOMM Computer Communication …, 2010 - dl.acm.org
We consider the potential for network trace analysis while providing the guarantees of"
differential privacy." While differential privacy provably obscures the presence or absence of …

A close look on n-grams in intrusion detection: anomaly detection vs. classification

C Wressnegger, G Schwenk, D Arp… - Proceedings of the 2013 …, 2013 - dl.acm.org
Detection methods based on n-gram models have been widely studied for the identification
of attacks and malicious software. These methods usually build on one of two learning …

[PDF][PDF] NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces.

Y Ye, Z Zhang, F Wang, X Zhang, D Xu - NDSS, 2021 - cs.purdue.edu
Network protocol reverse engineering is an important challenge with many security
applications. A popular kind of method leverages network message traces. These methods …