TY - GEN
T1 - Tracing sources of anonymous slow suspicious activities
AU - Kalutarage, Harsha K.
AU - Shaikh, Siraj A.
AU - Zhou, Qin
AU - James, Anne E.
PY - 2013
Y1 - 2013
N2 - Tracing down anonymous slow attackers creates number of challenges in network security. Simply analysing all traffic is not feasible. By aggregating information of large volume of events, it is possible to build a clear set of benchmarks of what should be considered as normal over extended period of time and hence to identify anomalies. This paper provides an anomaly based method for tracing down sources of slow suspicious activities in Cyber space. We present the theoretical account of our approach and experimental results.
AB - Tracing down anonymous slow attackers creates number of challenges in network security. Simply analysing all traffic is not feasible. By aggregating information of large volume of events, it is possible to build a clear set of benchmarks of what should be considered as normal over extended period of time and hence to identify anomalies. This paper provides an anomaly based method for tracing down sources of slow suspicious activities in Cyber space. We present the theoretical account of our approach and experimental results.
UR - http://www.scopus.com/inward/record.url?scp=84883379534&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-38631-2_10
DO - 10.1007/978-3-642-38631-2_10
M3 - Conference contribution
AN - SCOPUS:84883379534
SN - 9783642386305
VL - 7873 LNCS
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 122
EP - 134
BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
T2 - 7th International Conference on Network and System Security, NSS 2013
Y2 - 3 June 2013 through 4 June 2013
ER -