Abstract
As computer networks scale up in size and traffic volume, detecting slow suspicious activity, deliberately designed to stay beneath the threshold, becomes ever more difficult. Simply storing all packet captures for analysis is not feasible due to computational constraints. Detecting such activity depends on maintaining traffic history over extended periods of time, and using it to distinguish between suspicious and innocent nodes. The doctoral work presented here aims to adopt a Bayesian approach to address this problem, and to examine the effectiveness of such an approach under different network conditions: multiple attackers, traffic volume, subnet configuration and traffic sampling. We provide a theoretical account of our approach and very early experimental results.
Original language | English |
---|---|
Title of host publication | Proceedings of the Doctoral Symposium at the International Symposium on Engineering Secure Software and Systems, ESSoS-DS 2013 |
Publisher | CEUR-WS |
Pages | 36-40 |
Number of pages | 5 |
Volume | 965 |
Publication status | Published - 2013 |
Externally published | Yes |
Event | International Symposium on Engineering Secure Software and Systems, ESSoS-DS 2013 - Rocquencort, Paris, France Duration: 27 Feb 2013 → 01 Mar 2013 |
Conference
Conference | International Symposium on Engineering Secure Software and Systems, ESSoS-DS 2013 |
---|---|
Country/Territory | France |
City | Paris |
Period | 27/02/2013 → 01/03/2013 |
ASJC Scopus subject areas
- General Computer Science