Tracing sources of anonymous slow suspicious activities

Harsha K. Kalutarage, Siraj A. Shaikh, Qin Zhou, Anne E. James

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

Tracing down anonymous slow attackers creates number of challenges in network security. Simply analysing all traffic is not feasible. By aggregating information of large volume of events, it is possible to build a clear set of benchmarks of what should be considered as normal over extended period of time and hence to identify anomalies. This paper provides an anomaly based method for tracing down sources of slow suspicious activities in Cyber space. We present the theoretical account of our approach and experimental results.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages122-134
Number of pages13
Volume7873 LNCS
DOIs
Publication statusPublished - 2013
Externally publishedYes
Event7th International Conference on Network and System Security, NSS 2013 - Madrid, Spain
Duration: 03 Jun 201304 Jun 2013

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7873 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Conference

Conference7th International Conference on Network and System Security, NSS 2013
Country/TerritorySpain
CityMadrid
Period03/06/201304/06/2013

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

Fingerprint

Dive into the research topics of 'Tracing sources of anonymous slow suspicious activities'. Together they form a unique fingerprint.

Cite this