Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Harshvardhan P. Joshi"'
Autor:
Magreth Mushi, Harshvardhan P. Joshi, Rudra Dutta, Ismail Guvenc, Mihail L. Sichitiu, Thomas Zajkowski, Yufeng Xin, Michael J. Stealey, Erik L. Scott
Publikováno v:
2022 IFIP Networking Conference (IFIP Networking).
Autor:
Magreth Mushi, Harshvardhan P. Joshi, Rudra Dutta, Ismail Guvenc, Mihail L. Sichitiu, Brian Floyd, Thomas Zajkowski
Publikováno v:
IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
Autor:
Rudra Dutta, Harshvardhan P. Joshi
Publikováno v:
CNS
Several methods for P2P botnet detection have been proposed, including P2P community detection in a communication graph built from network traffic flows. This approach is more resilient to botnet traffic obfuscation or encryption compared to traffic
Autor:
Rudra Dutta, Harshvardhan P. Joshi
Publikováno v:
GLOBECOM
Large botnets have enormous combined computation and network resources which can be used to launch powerful attacks. Botnets that use peer-to-peer (P2P) command & control (C&C) overlay networks have emerged to make themselves resilient against detect
Autor:
Harshvardhan P. Joshi, Rudra Dutta
Publikováno v:
GLOBECOM
Botnets can be used to launch large scale and expensive attacks. Botnets are also difficult to detect and disable, especially when they use peer-to-peer (P2P) command a control structures. In this paper we propose GADFly - a fast and robust algorithm
Publikováno v:
Sarnoff Symposium
Botnets have long been used for malicious purposes with huge economic costs to the society. With the proliferation of cheap but non-secure Internet-of-Things (IoT) devices generating large amounts of data, the potential for damage from botnets has in
Publikováno v:
Journal of Network and Computer Applications. 146:102417
The traditional hardware-based physical network functions are increasingly being replaced with software-only Virtual Network Functions (VNFs). A systematic review on the VNF, scoped to cover research papers, open source projects, and standards, is co
Publikováno v:
Sarnoff Symposium
Software obfuscation is a commonly used technique to protect software, especially against reverse-engineering attacks. It is a form of security through obscurity and is commonly used for intellectual property and Digital Rights Management protection.