• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 299
Next 10 →

Tor: The secondgeneration onion router,”

by Roger Dingledine - in 13th USENIX Security Symposium. Usenix, , 2004
"... Abstract We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, an ..."
Abstract - Cited by 1229 (33 self) - Add to MetaCart
, and efficiency. We briefly describe our experiences with an international network of more than 30 nodes. We close with a list of open problems in anonymous communication. Overview Onion Routing is a distributed overlay network designed to anonymize TCP-based applications like web browsing, secure shell

Fast Portscan Detection Using Sequential Hypothesis Testing

by Jaeyeon Jung, Vern Paxson, Arthur W. Berger, Hari Balakrishnan - IN PROCEEDINGS OF THE IEEE SYMPOSIUM ON SECURITY AND PRIVACY , 2004
"... Attackers routinely perform random "portscans" of IP addresses to find vulnerable servers to compromise. Network Intrusion Detection Systems (NIDS) attempt to detect such behavior and flag these portscanners as malicious. An important need in such systems is prompt response: the sooner a N ..."
Abstract - Cited by 305 (12 self) - Add to MetaCart
NIDS detects malice, the lower the resulting damage. At the same time, a NIDS should not falsely implicate benign remote hosts as malicious. Balancing the

Panorama: Capturing system-wide information flow for malware detection and analysis

by Heng Yin, Dawn Song, Manuel Egele, Christopher Kruegel, Engin Kirda - In Proceedings of the 14th ACM Conferences on Computer and Communication Security (CCS’07 , 2007
"... Malicious programs spy on users ’ behavior and compromise their privacy. Even software from reputable vendors, such as Google Desktop and Sony DRM media player, may perform undesirable actions. Unfortunately, existing techniques for detecting malware and analyzing unknown code samples are insufficie ..."
Abstract - Cited by 195 (28 self) - Add to MetaCart
Malicious programs spy on users ’ behavior and compromise their privacy. Even software from reputable vendors, such as Google Desktop and Sony DRM media player, may perform undesirable actions. Unfortunately, existing techniques for detecting malware and analyzing unknown code samples

A Layered Architecture for Detecting Malicious Behaviors

by Lorenzo Martignoni, Elizabeth Stinson, John C. Mitchell - In Symposium on Recent Advances in Intrusion Detection (RAID , 2008
"... Abstract. We address the semantic gap problem in behavioral monitoring by using hierarchical behavior graphs to infer high-level behaviors from myriad low-level events. Our experimental system traces the execution of a process, performing data-flow analysis to identify meaningful actions such as “pr ..."
Abstract - Cited by 32 (3 self) - Add to MetaCart
such as “proxying”, “keystroke logging”, “data leaking”, and “downloading and executing a program ” from complex combinations of rudimentary system calls. To preemptively address evasive malware behavior, our specifications are carefully crafted to detect alternative sequences of events that achieve the same high

Using Session-Keystroke Mutual Information to Detect Self-Propagating Malicious Codes

by Syed Ali Khayam
"... Abstract — In this paper, we propose an endpoint-based joint network-host anomaly detection technique to detect selfpropagating malicious codes. Our proposed technique is based on the observation that on any endpoint there exists very high correlation between benign network sessions and the keystrok ..."
Abstract - Add to MetaCart
Abstract — In this paper, we propose an endpoint-based joint network-host anomaly detection technique to detect selfpropagating malicious codes. Our proposed technique is based on the observation that on any endpoint there exists very high correlation between benign network sessions

Towards detection and prevention of malicious activities . . .

by Apostolos Zarras , 2015
"... The Internet has witnessed a tremendous growth the last years. Undoubtedly, its services and mostly the World Wide Web have become an integral part in the lives of hundreds of millions of people, who use it in daily basis. Unfortunately, as the Internet’s popularity increases, so does the interest o ..."
Abstract - Add to MetaCart
address the security issues online users face every day from two points of view. First, we investigate how infected computers that constitu-te a botnet—network of compromised machines which are remotely controlled by

Botnet Detection Based on Correlation of Malicious Behaviors

by Chunyong Yin, Mian Zou, Darius Iko, Jin Wang
"... Botnet has become the most serious security threats on the current Internet infrastructure. Botnet is a group of compromised computers (Bots) which are remotely controlled by its originator (BotMaster) under a common Command and Control (C&C) infrastructure. Botnets can not only be implemented b ..."
Abstract - Add to MetaCart
by using existing well known bot tools, but can also be constructed from scratch and developed in own way, which makes the botnet detection a challenging problem. Because the P2P (peer to peer) botnet is a distributed malicious software network, it is more difficult to detect this bot. In this paper, we

Wide-scale Botnet Detection and Characterization Abstract — Malicious

by unknown authors
"... botnets are networks of compromised computers that are controlled remotely to perform large-scale distributed denial-of-service (DDoS) attacks, send spam, trojan and phishing emails, distribute pirated media or conduct other usually illegitimate activities. This paper describes a methodology to dete ..."
Abstract - Add to MetaCart
botnets are networks of compromised computers that are controlled remotely to perform large-scale distributed denial-of-service (DDoS) attacks, send spam, trojan and phishing emails, distribute pirated media or conduct other usually illegitimate activities. This paper describes a methodology

Botnet tracking: Exploring a root-cause methodology to prevent distributed denial-of-service attacks

by Felix C. Freiling, Thorsten Holz, Georg Wicherski - In Proceedings of 10 th European Symposium on Research in Computer Security, ESORICS , 2005
"... Abstract. Denial-of-Service (DoS) attacks pose a significant threat to the Internet today especially if they are distributed, i.e., launched simultaneously at a large number of systems. Reactive techniques that try to detect such an attack and throttle down malicious traffic prevail today but usuall ..."
Abstract - Cited by 122 (15 self) - Add to MetaCart
Abstract. Denial-of-Service (DoS) attacks pose a significant threat to the Internet today especially if they are distributed, i.e., launched simultaneously at a large number of systems. Reactive techniques that try to detect such an attack and throttle down malicious traffic prevail today

The ghost in the browser: Analysis of web-based malware

by Niels Provos, Dean Mcnamee, Panayiotis Mavrommatis, Ke Wang, Nagendra Modadugu, Google Inc - In Usenix Hotbots , 2007
"... As more users are connected to the Internet and conduct their daily activities electronically, computer users have become the target of an underground economy that infects hosts with malware or adware for financial gain. Unfortunately, even a single visit to an infected web site enables the attacker ..."
Abstract - Cited by 126 (5 self) - Add to MetaCart
the attacker to detect vulnerabilities in the user’s applications and force the download a multitude of malware binaries. Frequently, this malware allows the adversary to gain full control of the compromised systems leading to the ex-filtration of sensitive information or installation of utilities
Next 10 →
Results 1 - 10 of 299
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University