WJ
Willem Jonker
5 records found
1
HeadPrint
Detecting anomalous communications through header-based application fingerprinting
Passive application fingerprinting is a technique to detect anomalous outgoing connections. By monitoring the network traffic, a security monitor passively learns the network characteristics of the applications installed on each machine, and uses them to detect the presence of ne
...
We investigate the problem of detecting advanced covert channel techniques, namely victim-aware adaptive covert channels. An adaptive covert channel is considered victim-aware when the attacker mimics the content of its victim’s legitimate communication, such as application-layer
...
DECANTeR
DEteCtion of Anomalous outbouNd HTTP Traffic by Passive Application Fingerprinting
We present DECANTeR, a system to detect anomalous outbound HTTP communication, which passively extracts fingerprints for each application running on a monitored host. The goal of our system is to detect unknown malware and backdoor communication indicated by unknown fingerprints
...
In this paper, we report on a concerted modelling effort in the South African water resources sector in which system dynamics provides the paradigmatic framing for both a stakeholder engagement process and for developing an underpinning, integrative simulation model. We describe
...
We survey the notion of provably secure Searchable Encryption (SE) by giving a complete and comprehensive overview of the two main SE techniques: Searchable Symmetric Encryption (SSE) and Public Key Encryption with Keyword Search (PEKS). Since the pioneering work of Song, Wagner
...