On the reliability of network measurement techniques used for malware traffic analysis (Transcript of discussion)

Shishir Nagaraja

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

Abstract

Morning everybody. I’m going to talk about work along with my PhD student, Joe Gardiner, who’s sitting here. A while back we surveyed the literature on targeted attacks and defenses, for the CPNI (Centre for the Protection of National Infrastructure, http://www.cpni.gov.uk/advice/cyber/idata/.), and we found a number of unsolved challenges in the area. One of them is the challenges of measurement in large scale networks, which this talk is about.
Original languageEnglish
Title of host publicationSecurity Protocols XXII - 22nd International Workshop, Revised Selected Papers
EditorsFrank Stajano, Vashek Matyáš, Petr Švenda, Jonathan Anderson, Bruce Christianson, James Malcolm
Place of PublicationCham
PublisherSpringer-Verlag
Pages334-339
Number of pages6
Volume8809
ISBN (Print)9783319123998
DOIs
Publication statusPublished - 1 Jan 2014
Event22nd International Security Protocols Workshop, XXII 2014 - Cambridge, United Kingdom
Duration: 19 Mar 201421 Mar 2014

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8809
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference22nd International Security Protocols Workshop, XXII 2014
Country/TerritoryUnited Kingdom
CityCambridge
Period19/03/1421/03/14

Keywords

  • intrusion detection
  • uniform sampling
  • large scale network
  • flow size
  • inclusion probability
  • malware traffic analysis

Fingerprint

Dive into the research topics of 'On the reliability of network measurement techniques used for malware traffic analysis (Transcript of discussion)'. Together they form a unique fingerprint.

Cite this