- CIA Confirms Cyber Attack Caused Multi-City Power Outage. http://www.secureworks.com/research/ blog/research/21003/.Google Scholar
- Electricity Grid in U.S. Penetrated By Spies. http://online.wsj.com/article/ SB123914805204099085.html.Google Scholar
- Hackers Target Energy Industry. http://articles. latimes.com/2002/jul/08/science/sci-hackers8.Google Scholar
- Siemens: Stuxnet worm hit industrial systems. http://www.computerworld.com/s/article/print/ 9185419/Siemens_Stuxnet_worm_hit_industrial_ systems?taxonomyName=Network+ Security&taxonomyId=142.Google Scholar
- The risks to "SCADA" systems from Hackers. http://www.cip.ukcentre.com/security%202.htm.Google Scholar
- UAB computer forensics links internet postcards to virus. http://www.hindu.com/thehindu/holnus/ 008200907271321.htm.Google Scholar
- Zeus Tracker. https://zeustracker.abuse.ch.Google Scholar
- H. Bhanu. Timing Side-Channel Attacks On SSH. Master's thesis, Clemson University.Google Scholar
- R. Brooks, J. Schwier, and C. Griffin. Behavior detection using confidence intervals of hidden markov models. IEEE Trans. on Systems, Man, and Cybernetics, part B, 39(6):1484-1492, December 2009. Google ScholarDigital Library
- R. M. Craven. Traffic Analysis of Anonymity Systems. Master's thesis, Clemson University.Google Scholar
- Y. Lu, J. Schwier, R. Craven, R. Brooks, and C. Griffin. Inferring statistically significant hidden markov models. 2011.Google Scholar
- K. Pulasinghe, K. Watanabe, K. Izumi, and K. Kiguchi. Modular fuzzy-neuro controller driven by spoken language commands. IEEE Trans. on Systems, Man, and Cybernetics, part B, 34(1):293-302, Feburary 2004. Google ScholarDigital Library
- L. R. Rabiner. A tutorial on hidden markov models and selected applications in speech recognition. In Proceedings of the IEEE, volume 77, pages 257-286, Feburary 1989.Google ScholarCross Ref
- J. M. Schwier, R. R. Brooks, C. Griffin, and S. Bukkapatnam. Zero knowledge hidden markov model inference. Pattern Recognition Letters, 30(14):1273-1280, 2009. Google ScholarDigital Library
- C. Shalizi and J. Crutchfield. Computational Mechanics: Patterns and Prediction, Structure and Simplicity. Technical report, Santa Fe Institute, 2001.Google Scholar
- C. Shalizi, K. Shalizi, and J. Crutchfield. An algorithm for pattern discovery in time series. arXiv:cs.LG/0210025 v3, November 2002.Google Scholar
- B. K. Sin, J. Y. Ha, S. C. Oh, and J. H. Kim. Network-based approach to online cursive script recognition. IEEE Trans. on Systems, Man, and Cybernetics, part B, 29(2):321-328, April 1999. Google ScholarDigital Library
- T. Starner and A. Pentland. Visual recognition of american sign language using hidden markov models. Perceptual Computing Section, the Media Laboratory, Massachusetts Institute of Technology, Tech. Rep., 1995.Google Scholar
- Y. Wang, D. Ruan, J. Xu, M. Wen, and L. Deng. Computational intelligence algorithms analysis for smart grid cyber security. In Advances in Swarm Intelligence. SPRINGER. Google ScholarDigital Library
- L. Wei, T. Mahbod, and A. A. Ghorbani. Automatic discovery of botnet communities on large-scale communication networks. In Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS '09, pages 1-10, New York, NY, USA, 2009. ACM. Google ScholarDigital Library
- C. Wilson. Botnets, cybercrime, and cyberterrorism: Vulnerabilities and policy issues for congress. CRS Report for Congress, 2009.Google Scholar
- Botnet traffic detection using hidden Markov models
Recommendations
P2P hierarchical botnet traffic detection using hidden Markov models
LASER '12: Proceedings of the 2012 Workshop on Learning from Authoritative Security Experiment ResultsBotnets are a major source of spam, distributed denial-of-service attacks (DDoS) and other cybercrime [21]. Compromised computers are usually controlled by a centralized Command and Control (C&C) server. Hidden Markov models (HMMs) have been used ...
Masquerade detection using profile hidden Markov models
In this paper, we consider the problem of masquerade detection, based on user-issued UNIX commands. We present a novel detection technique based on profile hidden Markov models (PHMMs). For comparison purposes, we implement an existing modeling ...
HTTP botnet detection using hidden semi-Markov model with SNMP MIB variables
Botnet has become a prevalent platform for many malicious attacks and hence it is considered as a serious threat to internet security. A botmaster can control millions of compromised systems using command & control C&C infrastructure. At early time IRC ...
Comments