On the reliability of network measurement techniques used for malware traffic analysis (Transcript of discussion)

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

Abstract

Morning everybody. I’m going to talk about work along with my PhD student, Joe Gardiner, who’s sitting here. A while back we surveyed the literature on targeted attacks and defenses, for the CPNI (Centre for the Protection of National Infrastructure, http://www.cpni.gov.uk/advice/cyber/idata/.), and we found a number of unsolved challenges in the area. One of them is the challenges of measurement in large scale networks, which this talk is about.
LanguageEnglish
Title of host publicationSecurity Protocols XXII - 22nd International Workshop, Revised Selected Papers
EditorsFrank Stajano, Vashek Matyáš, Petr Švenda, Jonathan Anderson, Bruce Christianson, James Malcolm
Place of PublicationCham
PublisherSpringer-Verlag
Pages334-339
Number of pages6
Volume8809
ISBN (Print)9783319123998
DOIs
Publication statusPublished - 1 Jan 2014
Event22nd International Security Protocols Workshop, XXII 2014 - Cambridge, United Kingdom
Duration: 19 Mar 201421 Mar 2014

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8809
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference22nd International Security Protocols Workshop, XXII 2014
CountryUnited Kingdom
CityCambridge
Period19/03/1421/03/14

Fingerprint

Network Measurement
Traffic Analysis
Malware
Measurement Techniques
Infrastructure
Attack
Students

Keywords

  • intrusion detection
  • uniform sampling
  • large scale network
  • flow size
  • inclusion probability
  • malware traffic analysis

Cite this

Nagaraja, S. (2014). On the reliability of network measurement techniques used for malware traffic analysis (Transcript of discussion). In F. Stajano, V. Matyáš, P. Švenda, J. Anderson, B. Christianson, & J. Malcolm (Eds.), Security Protocols XXII - 22nd International Workshop, Revised Selected Papers (Vol. 8809, pp. 334-339). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 8809). Cham: Springer-Verlag. https://doi.org/10.1007/978-3-319-12400-1_32
Nagaraja, Shishir. / On the reliability of network measurement techniques used for malware traffic analysis (Transcript of discussion). Security Protocols XXII - 22nd International Workshop, Revised Selected Papers. editor / Frank Stajano ; Vashek Matyáš ; Petr Švenda ; Jonathan Anderson ; Bruce Christianson ; James Malcolm. Vol. 8809 Cham : Springer-Verlag, 2014. pp. 334-339 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{9c93f5172e64481087cfd11edd9d1279,
title = "On the reliability of network measurement techniques used for malware traffic analysis (Transcript of discussion)",
abstract = "Morning everybody. I’m going to talk about work along with my PhD student, Joe Gardiner, who’s sitting here. A while back we surveyed the literature on targeted attacks and defenses, for the CPNI (Centre for the Protection of National Infrastructure, http://www.cpni.gov.uk/advice/cyber/idata/.), and we found a number of unsolved challenges in the area. One of them is the challenges of measurement in large scale networks, which this talk is about.",
keywords = "intrusion detection, uniform sampling, large scale network, flow size, inclusion probability, malware traffic analysis",
author = "Shishir Nagaraja",
year = "2014",
month = "1",
day = "1",
doi = "10.1007/978-3-319-12400-1_32",
language = "English",
isbn = "9783319123998",
volume = "8809",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer-Verlag",
pages = "334--339",
editor = "Frank Stajano and Vashek Maty{\'a}š and Petr Švenda and Jonathan Anderson and Bruce Christianson and James Malcolm",
booktitle = "Security Protocols XXII - 22nd International Workshop, Revised Selected Papers",

}

Nagaraja, S 2014, On the reliability of network measurement techniques used for malware traffic analysis (Transcript of discussion). in F Stajano, V Matyáš, P Švenda, J Anderson, B Christianson & J Malcolm (eds), Security Protocols XXII - 22nd International Workshop, Revised Selected Papers. vol. 8809, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 8809, Springer-Verlag, Cham, pp. 334-339, 22nd International Security Protocols Workshop, XXII 2014, Cambridge, United Kingdom, 19/03/14. https://doi.org/10.1007/978-3-319-12400-1_32

On the reliability of network measurement techniques used for malware traffic analysis (Transcript of discussion). / Nagaraja, Shishir.

Security Protocols XXII - 22nd International Workshop, Revised Selected Papers. ed. / Frank Stajano; Vashek Matyáš; Petr Švenda; Jonathan Anderson; Bruce Christianson; James Malcolm. Vol. 8809 Cham : Springer-Verlag, 2014. p. 334-339 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 8809).

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

TY - GEN

T1 - On the reliability of network measurement techniques used for malware traffic analysis (Transcript of discussion)

AU - Nagaraja, Shishir

PY - 2014/1/1

Y1 - 2014/1/1

N2 - Morning everybody. I’m going to talk about work along with my PhD student, Joe Gardiner, who’s sitting here. A while back we surveyed the literature on targeted attacks and defenses, for the CPNI (Centre for the Protection of National Infrastructure, http://www.cpni.gov.uk/advice/cyber/idata/.), and we found a number of unsolved challenges in the area. One of them is the challenges of measurement in large scale networks, which this talk is about.

AB - Morning everybody. I’m going to talk about work along with my PhD student, Joe Gardiner, who’s sitting here. A while back we surveyed the literature on targeted attacks and defenses, for the CPNI (Centre for the Protection of National Infrastructure, http://www.cpni.gov.uk/advice/cyber/idata/.), and we found a number of unsolved challenges in the area. One of them is the challenges of measurement in large scale networks, which this talk is about.

KW - intrusion detection

KW - uniform sampling

KW - large scale network

KW - flow size

KW - inclusion probability

KW - malware traffic analysis

UR - http://www.scopus.com/inward/record.url?scp=84921470379&partnerID=8YFLogxK

U2 - 10.1007/978-3-319-12400-1_32

DO - 10.1007/978-3-319-12400-1_32

M3 - Conference contribution book

SN - 9783319123998

VL - 8809

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 334

EP - 339

BT - Security Protocols XXII - 22nd International Workshop, Revised Selected Papers

A2 - Stajano, Frank

A2 - Matyáš, Vashek

A2 - Švenda, Petr

A2 - Anderson, Jonathan

A2 - Christianson, Bruce

A2 - Malcolm, James

PB - Springer-Verlag

CY - Cham

ER -

Nagaraja S. On the reliability of network measurement techniques used for malware traffic analysis (Transcript of discussion). In Stajano F, Matyáš V, Švenda P, Anderson J, Christianson B, Malcolm J, editors, Security Protocols XXII - 22nd International Workshop, Revised Selected Papers. Vol. 8809. Cham: Springer-Verlag. 2014. p. 334-339. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-319-12400-1_32