Topics: Network Situational Awareness
Authors: M. P. Collins (Redjack), Michael K. Reiter
In this paper, the authors present a novel method for detecting hit-list worms using protocol graphs.
Topics: Insider Threat
Authors: Michael Collins, Michael K. Reiter
In this paper, the authors propose a set of tests for identifying masqueraded peer-to-peer file-sharing based on traffic summaries (flows).
Topics: Network Situational Awareness
Authors: Michael Collins, Michael K. Reiter
In this paper, the authors provide an empirical analysis of proposed techniques for filtering network traffic.