Scalable analytics to detect DNS misuse for establishing stealthy communication channels (English)
- New search for: Schales, D. L.
- New search for: Jang, J.
- New search for: Wang, T.
- New search for: Hu, X.
- New search for: Kirat, D.
- New search for: Wuest, B.
- New search for: Stoecklin, M. Ph.
- New search for: Schales, D. L.
- New search for: Jang, J.
- New search for: Wang, T.
- New search for: Hu, X.
- New search for: Kirat, D.
- New search for: Wuest, B.
- New search for: Stoecklin, M. Ph.
In:
IBM Journal of Research and Development
;
60
, 4
;
3:1-3:14
;
2016
-
ISSN:
- Article (Journal) / Electronic Resource
-
Title:Scalable analytics to detect DNS misuse for establishing stealthy communication channels
-
Contributors:Schales, D. L. ( author ) / Jang, J. ( author ) / Wang, T. ( author ) / Hu, X. ( author ) / Kirat, D. ( author ) / Wuest, B. ( author ) / Stoecklin, M. Ph. ( author )
-
Published in:IBM Journal of Research and Development ; 60, 4 ; 3:1-3:14
-
Publisher:
- New search for: IEEE
-
Publication date:2016-07-01
-
Size:3891514 byte
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Source:
Table of contents – Volume 60, Issue 4
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 0:1
-
Preface: Security intelligenceRao, J. R. et al. | 2016
- 1
-
Table of Contents| 2016
- 2:1
-
Data classification and sensitivity estimation for critical asset discoveryPark, Y. / Teiken, W. / Rao, J. R. / Chari, S. N. et al. | 2016
- 3:1
-
Scalable analytics to detect DNS misuse for establishing stealthy communication channelsSchales, D. L. / Jang, J. / Wang, T. / Hu, X. / Kirat, D. / Wuest, B. / Stoecklin, M. Ph. et al. | 2016
- 4:1
-
Firstfilter: A cost-sensitive approach to malicious URL detection in large-scale enterprise networksVu, L. / Nguyen, P. / Turaga, D. et al. | 2016
- 5:1
-
Identifying malicious activities from system execution tracesAharoni, E. / Peleg, R. / Regev, S. / Salman, T. et al. | 2016
- 6:1
-
Scalable malware classification with multifaceted content features and threat intelligenceHu, X. / Jang, J. / Wang, T. / Ashraf, Z. / Stoecklin, M. Ph. / Kirat, D. et al. | 2016
- 7:1
-
A platform and analytics for usage and entitlement analyticsChari, S. N. / Habeck, T. A. / Molloy, I. / Park, Y. / Rao, J. R. / Teiken, W. et al. | 2016
- 8:1
-
Uncovering insider threats from the digital footprints of individualsCoden, A. / Lin, W. S. / Houck, K. / Tanenblatt, M. / Boston, J. / MacNaught, J. E. / Soroker, D. / Weisz, J. D. / Pan, S. / Lai, J.-H. et al. | 2016
- 9:1
-
Passive security intelligence to analyze the security risks of mobile/BYOD activitiesStoecklin, M. Ph. / Singh, K. / Koved, L. / Hu, X. / Chari, S. N. / Rao, J. R. / Cheng, P.-C. / Christodorescu, M. / Sailer, R. / Schales, D. L. et al. | 2016
- 10:1
-
Closing the loop: Network and in-host monitoring tandem for comprehensive cloud security visibilityBerger, S. / Chen, Y. / Hu, X. / Pendarakis, D. / Rao, J. R. / Sailer, R. / Schales, D. L. / Stoecklin, M. P. et al. | 2016
- 11:1
-
Security intelligence for cloud management infrastructuresBerger, S. / Garion, S. / Moatti, Y. / Naor, D. / Pendarakis, D. / Shulman-Peleg, A. / Rao, J. R. / Valdez, E. / Weinsberg, Y. et al. | 2016
- 12:1
-
Secure yet usable: Protecting servers and Linux containersBarlev, S. / Basil, Z. / Kohanim, S. / Peleg, R. / Regev, S. / Shulman-Peleg, A. et al. | 2016
- 13:1
-
Security intelligence for industrial control systemsAmrein, A. / Angeletti, V. / Beitler, A. / Nemet, M. / Reiser, M. / Riccetti, S. / Stoecklin, M. Ph. / Wespi, A. et al. | 2016
- 14:1
-
IPV: A system for identifying privacy vulnerabilities in datasetsGkoulalas-Divanis, A. / Braghin, S. et al. | 2016
- C1
-
Cover 1| 2016