A survey of visualization systems for network security
H Shiravi, A Shiravi, AA Ghorbani - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
Security Visualization is a very young term. It expresses the idea that common visualization
techniques have been designed for use cases that are not supportive of security-related …
techniques have been designed for use cases that are not supportive of security-related …
Preserving the privacy of sensitive relationships in graph data
In this paper, we focus on the problem of preserving the privacy of sensitive relationships in
graph data. We refer to the problem of inferring sensitive relationships from anonymized …
graph data. We refer to the problem of inferring sensitive relationships from anonymized …
Embark: Securely outsourcing middleboxes to the cloud
It is increasingly common for enterprises and other organizations to outsource network
processing to the cloud. For example, enterprises may outsource firewalling, caching, and …
processing to the cloud. For example, enterprises may outsource firewalling, caching, and …
Sanitizable signatures
G Ateniese, DH Chou, B De Medeiros… - … Security–ESORICS 2005 …, 2005 - Springer
We introduce the notion of sanitizable signatures that offer many attractive security features
for certain current and emerging applications. A sanitizable signature allows authorized …
for certain current and emerging applications. A sanitizable signature allows authorized …
The devil and packet trace anonymization
Releasing network measurement data---including packet traces---to the research community
is a virtuous activity that promotes solid research. However, in practice, releasing …
is a virtuous activity that promotes solid research. However, in practice, releasing …
Towards automated protocol reverse engineering using semantic information
Network security products, such as NIDS or application firewalls, tend to focus on application
level communication flows. However, adding support for new proprietary and often …
level communication flows. However, adding support for new proprietary and often …
Strategies for sound internet measurement
V Paxson - Proceedings of the 4th ACM SIGCOMM Conference on …, 2004 - dl.acm.org
Conducting an Internet measurement study in a sound fashion can be much more difficult
than it might first appear. We present a number of strategies drawn from experiences for …
than it might first appear. We present a number of strategies drawn from experiences for …
Differentially-private network trace analysis
F McSherry, R Mahajan - ACM SIGCOMM Computer Communication …, 2010 - dl.acm.org
We consider the potential for network trace analysis while providing the guarantees of"
differential privacy." While differential privacy provably obscures the presence or absence of …
differential privacy." While differential privacy provably obscures the presence or absence of …
A close look on n-grams in intrusion detection: anomaly detection vs. classification
Detection methods based on n-gram models have been widely studied for the identification
of attacks and malicious software. These methods usually build on one of two learning …
of attacks and malicious software. These methods usually build on one of two learning …
[PDF][PDF] NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces.
Network protocol reverse engineering is an important challenge with many security
applications. A popular kind of method leverages network message traces. These methods …
applications. A popular kind of method leverages network message traces. These methods …