Filters








3,808 Hits in 6.4 sec

Risk analysis of host identity protocol

Juha Sääskilahti, Mikko Särelä
2010 Proceedings of the Fourth European Conference on Software Architecture Companion Volume - ECSA '10  
In this study we develop a Risk Identification method based on Value Chain Dynamics Toolkit (VCDT) and apply it on Risk Analysis of HIP protocol in simple host-server scenario.  ...  Mind maps (with templates) and visualization tools (e.g. Powerpoint) are used as aid. The HIP Risk Analysis revealed no new risks inherent to protocol itself.  ...  Inserting faulty records to the DNS server may also be attempted for the same effect.  ... 
doi:10.1145/1842752.1842794 dblp:conf/ecsa/SaaskilahtiS10 fatcat:7qpoc64625atjnc62ctdu47eu4

Cylindrical Coordinates Security Visualization for multiple domain command and control botnet detection

Ilju Seo, Heejo Lee, Seung Chul Han
2014 Computers & security  
Graph isomorphism Visual signature a b s t r a c t The botnets are one of the most dangerous species of network-based attack.  ...  The ideas and results of this study will contribute toward designing an advanced visualization technique that offers better security.  ...  Network-data based approaches: Network Eye Fink et al. (2004) is a visualization tool developed for network administrators.  ... 
doi:10.1016/j.cose.2014.07.007 fatcat:eo3o4mazyzgcdoxhac5bl5fo4e

A Survey on Cyber Situation Awareness Systems: Framework, Techniques, and Insights

Hooman Alavizadeh, Julian Jang-Jaccard, Simon Yusuf Enoch, Harith Al-Sahaf, Ian Welch, Seyit A. Camtepe, Dan Dongseong Kim
2022 ACM Computing Surveys  
This paper provides a comprehensive study on the current state-of-the-art in the cyber SA to discuss the following aspects of SA: key design principles, framework, classifications, data collection, analysis  ...  Cyberspace is full of uncertainty in terms of advanced and sophisticated cyber threats which are equipped with novel approaches to learn the system and propagate themselves, such as AI-powered threats.  ...  ACKNOWLEDGMENTS This work was supported by the Cyber Security Research Programme-"Artificial Intelligence for Automating Response to Threats" from the Ministry of Business, Innovation, and Employment (  ... 
doi:10.1145/3530809 fatcat:cwk5bp56ere5re2frzgzox56ka

Domain Name System Security and Privacy: A Contemporary Survey [article]

Aminollah Khormali, Jeman Park, Hisham Alasmary, Afsah Anwar, David Mohaisen
2020 arXiv   pre-print
This paper not only focuses on the DNS threat landscape and existing challenges, but also discusses the utilized data analysis methods, which are frequently used to address DNS threat vulnerabilities.  ...  However, due to the vulnerability of DNS to various threats, its security and functionality have been continuously challenged over the course of time.  ...  for understanding the DNS-based network threat analysis.  ... 
arXiv:2006.15277v1 fatcat:loknouehirdhvdgztkevi27vse

A Survey on Threat Situation Awareness Systems: Framework, Techniques, and Insights [article]

Hooman Alavizadeh, Julian Jang-Jaccard, Simon Yusuf Enoch, Harith Al-Sahaf, Ian Welch, Seyit A. Camtepe, Dong Seong Kim
2021 arXiv   pre-print
analysis of the techniques, and evaluation methods.  ...  This paper provides a comprehensive study on the current state-of-the-art in the cyber SA to discuss the following aspects of SA: key design principles, framework, classifications, data collection, and  ...  ACKNOWLEDGEMENT This work was supported by the Cyber Security Research Programme-"Artificial Intelligence for Automating Response to Threats" from the Ministry of Business, Innovation, and Employment (  ... 
arXiv:2110.15747v1 fatcat:zboddcg4a5gdxmq5hqmo5cpj34

Evaluation of Apache Spot's machine learning capabilities in an SDN/NFV enabled environment

Christos M. Mathas, Olga E. Segou, Georgios Xylouris, Dimitris Christinakis, Michail-Alexandros Kourtis, Costas Vassilakis, Anastasios Kourtis
2018 Zenodo  
Software Defined Networking (SDN) and Network Function Virtualisation (NFV) are transforming modern networks towards a service oriented architecture.  ...  Traditional intrusion detection systems perform signature based detection, based on well known malicious traffic patterns that signify potential attacks.  ...  Laboratory, National Centre for Scientific Research "Demokritos" (Athens, Greece), accessible at https://soda.dit.uop.gr/sites/soda.dit.uop.gr/files/mathas-bscthesis-final.pdf .  ... 
doi:10.5281/zenodo.3266022 fatcat:eqlg6qq7dzftfmwp2waomztf3m

Clarified Recorder and Analyzer for Visual Drill Down Network Analysis [chapter]

Jani Kenttälä, Joachim Viide, Timo Ojala, Pekka Pietikäinen, Mikko Hiltunen, Jyrki Huhta, Mikko Kenttälä, Ossi Salmi, Toni Hakanen
2009 Lecture Notes in Computer Science  
This paper presents the Clarified system for passive network analysis.  ...  It is based on capturing complete packet history and abstracting it in form of different interactive high-level visual presentations.  ...  However, the tradeoff is that the system does not scale up for high speed core networks. We are currently expanding the system towards wiki-based collaborative analysis. Note.  ... 
doi:10.1007/978-3-642-00975-4_12 fatcat:6ttf3ujed5hf3jpiyu6srdlc6y

CYBER-SECURITY IN THE NEW ERA OF INTEGRATED OPERATIONAL – INFORMATIONAL TECHNOLOGY SYSTEMS

Vlad Daniel Savin, Bucharest University of Economic Studies, Bucharest, Romania
2021 Business Excellence and Management  
Digital Revolution has forced previously isolated networks of critical infrastructures to become more digitally integrated.  ...  It also offers a glimpse into the need for the further development of new protection mechanisms developed on the emerging new technologies.  ...  Acknowledgments I would like to express my gratitude to Professor Nadia Ciocoiu from Bucharest University of Economic Studies for the valuable support and guidance provided.  ... 
doi:10.24818/beman/2021.11.1-05 fatcat:mw7643ucofgqjcqsl5ifghspd4

OwlSight: Platform for Real-Time Detection and Visualization of Cyber Threats

Vasco Samuel Carvalho, Maria Joao Polidoro, Joao Paulo Magalhaes
2016 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS)  
In this paper we present a cyber threat platform targeted for real-time detection and visualization of cyber threats.  ...  It collects more than 107 million of malware events daily from different data sources and provides visualization and alerts in real-time for more than 2.7 million of infected unique IPs spread around the  ...  In this paper we present a proactive cyber threat platform targeted for real-time detection and visualization of cyber threats.  ... 
doi:10.1109/bigdatasecurity-hpsc-ids.2016.73 fatcat:fcsqrytgobejdesogsbbflzoui

The Creative Brain Under Stress: Considerations for Performance in Extreme Environments

Oshin Vartanian, Sidney Ann Saint, Nicole Herz, Peter Suedfeld
2020 Frontiers in Psychology  
our understanding of the behavioral effects of stress on creativity.  ...  Specifically, a converging body of evidence from various domains has demonstrated that creativity arises from the interaction of two large-scale systems in the brain: Whereas the default network (DN) is  ...  FIGURE 1 | 1 Cognitive mechanisms of brain network interactions during creative cognition. DN, default-mode network; ECN, executive control network; VN, visual network.  ... 
doi:10.3389/fpsyg.2020.585969 pmid:33192916 pmcid:PMC7662463 fatcat:ln4ppxqrc5hbxlzjmb34av3hiq

Botnet Detection in Anonymous Networks

Katharina Kuhnert, Jessica Steinberger, Harald Baier
2018 Autonomous Infrastructure, Management and Security  
Within the security and network and service management community, AIMS is focused on PhD students and young researchers.  ...  for the DNS (SAND) project, phase 3 (http://www.sand-project.nl).  ...  SIDNfonds is an independent fund on the initiative of SIDN, the registrar for '.nl' domains.  ... 
dblp:conf/aims/KuhnertSB18 fatcat:745qy2tejngb5apqlse4sn3djm

Towards an Operational Semantic Theory of Cyber Defense Against Advanced Persistent Threats

Steven Meckl, Gheorghe Tecuci, Mihai Boicu, Dorin Marcu
2015 Semantic Technologies for Intelligence, Defense, and Security  
knowledge base of a cognitive agent, and the development and integration of such agents into a specific cyber security operation center.  ...  This paper presents current work on developing an operational semantic theory of cyber defense against advanced persistent threats (APTs), which is grounded in cyber threat analytics, science of evidence  ...  CSOCs leverage a rich tool set including host-based and network-based intrusion detection systems (IDSs), data collections, analysis tools, and visualization tools.  ... 
dblp:conf/stids/MecklTBM15 fatcat:wrj35r4mlfcljlxt7kmyaq664i

Forming IDEAS Interactive Data Exploration & Analysis System [article]

Robert A. Bridges, Maria A. Vincent, Kelly M. T. Huffer, John R. Goodall, Jessie D. Jamieson, Zachary Burch
2018 arXiv   pre-print
To this end, we present our work to build IDEAS (Interactive Data Exploration and Analysis System).  ...  While commonplace, current investigations are time-consuming, intuition-based, and proving insufficient.  ...  Hunting Advanced Persistent Threats: Advanced Persistent Threats (APTs) are adversaries using advanced/novel techniques to maintain a long-term, stealth foothold in the network.  ... 
arXiv:1805.09676v2 fatcat:adc75rrkjjgp3fddxxpf3ifs5a

Visualizing DNS traffic

Pin Ren, John Kristoff, Bruce Gooch
2006 Proceedings of the 3rd international workshop on Visualization for computer security - VizSEC '06  
for visualizing DNS queries.  ...  We present Flying Term, a new perceptually motivated visual metaphor for visualizing the dynamic nature of DNS queries.  ...  There are several design considerations for DNS query data visualization. Based on our design goal, we want the visualization tool to: 1.  ... 
doi:10.1145/1179576.1179582 dblp:conf/vizsec/RenKG06 fatcat:dzj2lz77jnhlpec3f67fxhydaa

A forensic case study on as hijacking

Johann Schlamp, Georg Carle, Ernst W. Biersack
2013 Computer communication review  
Our findings show that there is a need for preventive measures that would allow to anticipate AS hijacking and we outline the design of an early warning system.  ...  In this paper, we study a malicious case of AS hijacking, carried out in order to send spam from the victim's network.  ...  ACKNOWLEDGEMENTS We thank Pierre-Antoine Vervier for introducing us to the LinkTel incident, and Lothar Braun for providing us access to archived MWN netflow data.  ... 
doi:10.1145/2479957.2479959 fatcat:3v4qp27y4zdzrb7s7dveujimtq
« Previous Showing results 1 — 15 out of 3,808 results