Buscar
Mostrando ítems 1-10 de 52
High-speed analysis of SMB2 file sharing traffic without TCP stream reconstruction
(IEEE, 2019)
info:eu-repo/semantics/conferenceObject,
This paper presents a file sharing traffic analysis methodology for Server Message Block (SMB), a common protocol in the corporate environment. The design is focused on improving the traffic analysis rate that can be ...
A passive traffic algorithm for detecting unavailable periods in TCP services
(IARIA, 2015)
Artículo / Artikulua,
This paper presents a simple passive algorithm to monitor
service availability. The algorithm is based on packet counting
over a passive traffic trace of a population of clients accessing
servers of interest. The major ...
Detecting disruption periods on TCP servers with passive packet traffic analysis
(IARIA, 2015)
Contribución a congreso / Biltzarrerako ekarpena,
This paper presents a simple passive algorithm to monitor
service availability. The algorithm is based on packet counting
over a passive traffic trace of a population of clients accessing
servers of interest. The major ...
Crypto-ransomware detection using machine learning models in file-sharing network scenarios with encrypted traffic
(Elsevier, 2022)
Artículo / Artikulua,
Ransomware is considered as a significant threat for home users and enterprises. In corporate scenarios, users’
computers usually store only system and program files, while all the documents are accessed from shared
servers. ...
On the reduction of authoritative DNS cache timeouts: detection and implications for user privacy
(Elsevier, 2021)
info:eu-repo/semantics/article,
The domain name system (DNS) is an Internet network service that is used by hosts to resolve IP addresses from symbolic names. This basic service has been attacked and abused many times, as it is one of the oldest and most ...
Ransomware early detection by the analysis of file sharing traffic
(Elsevier, 2018)
Artículo / Artikulua,
Crypto ransomware is a type of malware that locks access to user files by encrypting them and demands a ransom in order to obtain the decryption key. This type of malware has become a serious threat for most enterprises. ...
Remote access protocols for Desktop-as-a-Service solutions
(Public Library of Science, 2019)
Artículo / Artikulua,
The use of remote desktop services on virtualized machines is a general trend to reduce the cost of desktop seats. Instead of assigning a physical machine with its operating system and software to each user, it is considerably ...
TBDClust: time-based density clustering to enable free browsing of sites in pay-per-use mobile Internet providers
(Elsevier, 2017)
Artículo / Artikulua,
The World Wide Web has evolved rapidly, incorporating new content types and becoming more dynamic. The contents from a website can be distributed between several servers, and as a consequence, web traffic has become ...
Computation of traffic time series for large populations of IoT devices
(MDPI, 2018)
Artículo / Artikulua,
En este artículo se estudian las tecnicas para clasificar paquetes de tráfico de red en múltiples clases orientadas a la realización de series temporales de tráfico en escenarios de un elevado numero de clases como pueden ...
A survey on detection techniques for cryptographic ransomware
(IEEE, 2019)
info:eu-repo/semantics/article,
Crypto-ransomware is a type of malware that encrypts user files, deletes the original data, and asks for a ransom to recover the hijacked documents. It is a cyber threat that targets both companies and residential users, ...