|Present||Assistant Professor, Wright State University ‐ Computer Science and Engineering|
Russ Engineering Ctr 303
3640 Colonel Glenn Hwy
Dayton, OH 45435-0001
Conference Proceedings (8)
Exposing Invisible Timing-Based Traffic Watermarks with BACKLIT
Proceedings of the 27th Annual Computer Security Applications Conference (2011)
Traffic watermarking is an important element in many network security and privacy applications, such as tracing botnet C&C communications and ...
Detecting Stealthy P2P Botnets Using Statistical Traffic Fingerprints
Proceedings of the International Conference on Dependable Systems and Networks (2011)
Peer-to-peer (P2P) botnets have recently been adopted by botmasters for their resiliency to take-down efforts. Besides being harder to take ...
Boosting the Scalability of Botnet Detection Using Adaptive Traffic Sampling
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (2011)
Botnets pose a serious threat to the health of the Internet. Most current network-based botnet detection systems require deep packet ...
BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic
Proceedings of the 15th Annual Network and Distributed System Security Symposium (2008)
Botnets are now recognized as one of the most serious security threats. In contrast to previous malware, botnets have the ...
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent ...
Proceedings of the 17th USENIX Security Symposium (2008)
Botnets are now the key platform for many Internet attacks, such as spam, distributed denial-of-service (DDoS), identity theft, and phishing. ...