Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMarch 2022
Lightweight Hybrid Detection of Data Exfiltration using DNS based on Machine Learning
- Samaneh Mahdavifar,
- Amgad Hanafy Salem,
- Princy Victor,
- Amir H. Razavi,
- Miguel Garzon,
- Natasha Hellberg,
- Arash Habibi Lashkari
ICCNS '21: Proceedings of the 2021 11th International Conference on Communication and Network SecurityPages 80–86https://doi.org/10.1145/3507509.3507520Domain Name System (DNS) is a popular way to steal sensitive information from enterprise networks and maintain a covert tunnel for command and control communications with a malicious server. Due to the significant role of DNS services, enterprises ...
- research-articleMarch 2021
Novel Infrared phototransistor based on Junctionless TFET design: Numerical Analysis and Performance Assessment
ICIST '20: Proceedings of the 10th International Conference on Information Systems and TechnologiesArticle No.: 37, Pages 1–5https://doi.org/10.1145/3447568.3448545In this paper, a novel Infrared (IR) sensor based on Junctionless (JL) Germanium optically controlled gate (OC) Tunneling-FET phototransistor is proposed and numerically investigated. An exhaustive study concerning the working mechanism of the proposed ...
- research-articleDecember 2018
Implementation of IPsec VPN with SIP Softphones using GNS3
ICNCC '18: Proceedings of the 2018 VII International Conference on Network, Communication and ComputingPages 152–156https://doi.org/10.1145/3301326.3301333Over the past decades, Session Initiation Protocol (SIP) has achieved much attention regarding Voice over IP services(VOIP) when comparing with various protocols like H.323 or MGCP. SIP is the special protocol for present and future IP telephony ...
- short-paperApril 2016
Detection of Tunnels in PCAP Data by Random Forests
CISRC '16: Proceedings of the 11th Annual Cyber and Information Security Research ConferenceArticle No.: 16, Pages 1–4https://doi.org/10.1145/2897795.2897804This paper describes an approach for detecting the presence of domain name system (DNS) tunnels in network traffic. DNS tunneling is a common technique hackers use to establish command and control nodes and to exfiltrate data from networks. To generate ...
- research-articleMarch 2016
A Wormhole Attack in Mobile Ad-hoc Network: Detection and Prevention
ICTCS '16: Proceedings of the Second International Conference on Information and Communication Technology for Competitive StrategiesArticle No.: 31, Pages 1–4https://doi.org/10.1145/2905055.2905237In Mobile Ad hoc Network (MANET) is a self-organizing session of communication between wireless mobile nodes build up dynamically regardless of any established infrastructure or central authority. In MANET each node behaves as a sender, receiver and ...