Showing 1 - 10 of 38 results for the Publish Year - 2005 , Type - White Paper
In this paper, the authors introduce a method for detecting the onset of anomalous port-specific activity by recognizing deviation from correlated activity.
In this paper, the authors present VisFlowConnect-IP, a network flow visualization tool that detects and investigates anomalous network traffic.
In this paper, Josh McNutt discusses the R statistical language as an analysis and visualization interface to SiLK flow analysis tools.
In this paper, the authors describe NVisionIP, a NetFlow visualization tool.
In this paper, the authors introduce a tool to address two problems with using Net-Flow logs for security analysis.
In this FloCon 2005 presentation, the author uses traffic analysis to investigate a stealthy form of data exfiltration.
This paper addresses the problems associated with a lack of a clear security taxonomy by identifying four different types of security-related requirements, providing them with clear definitions, and placing them within an organizing hierarchical taxonomy.
In this paper, Brian Trammell presents a proposed solution to the problem of mutual unintelligibility of raw flow and intermediate analysis data.
This position paper argues that a successful COTS evaluation process should be based on the principles of method engineering (ME).
In this paper, the authors describe the capabilities present in bot malware and the motivations for operating botnets.