@inproceedings{9c93f5172e64481087cfd11edd9d1279,
title = "On the reliability of network measurement techniques used for malware traffic analysis (Transcript of discussion)",
abstract = "Morning everybody. I{\textquoteright}m going to talk about work along with my PhD student, Joe Gardiner, who{\textquoteright}s sitting here. A while back we surveyed the literature on targeted attacks and defenses, for the CPNI (Centre for the Protection of National Infrastructure, http://www.cpni.gov.uk/advice/cyber/idata/.), and we found a number of unsolved challenges in the area. One of them is the challenges of measurement in large scale networks, which this talk is about.",
keywords = "intrusion detection, uniform sampling, large scale network, flow size, inclusion probability, malware traffic analysis",
author = "Shishir Nagaraja",
year = "2014",
month = jan,
day = "1",
doi = "10.1007/978-3-319-12400-1_32",
language = "English",
isbn = "9783319123998",
volume = "8809",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer-Verlag",
pages = "334--339",
editor = "Frank Stajano and Vashek Maty{\'a}{\v s} and Petr {\v S}venda and Jonathan Anderson and Bruce Christianson and James Malcolm",
booktitle = "Security Protocols XXII - 22nd International Workshop, Revised Selected Papers",
note = "22nd International Security Protocols Workshop, XXII 2014 ; Conference date: 19-03-2014 Through 21-03-2014",
}