Search For:

Displaying 1-7 out of 7 total
Gone Rogue: An Analysis of Rogue Security Software Campaigns
Found in: Computer Network Defense, European Conference on
By Marco Cova, Corrado Leita, Olivier Thonnard, Angelos Keromytis, Marc Dacier
Issue Date:November 2009
pp. 1-3
In the past few years, Internet miscreants have developed a number of techniques to defraud and make a hefty profit out of their unsuspecting victims. A troubling, recent example of this trend is cyber-criminals distributing rogue security software, that i...
 
An Experimental Study of Diversity with Off-the-Shelf AntiVirus Engines
Found in: Network Computing and Applications, IEEE International Symposium on
By Ilir Gashi, Vladimir Stankovic, Corrado Leita, Olivier Thonnard
Issue Date:July 2009
pp. 4-11
Fault tolerance in the form of diverse redundancy is well known to improve the detection rates for both malicious and non-malicious failures. What is of interest to designers of security protection systems are the actual gains in detection rates that they ...
 
Actionable Knowledge Discovery for Threats Intelligence Support Using a Multi-dimensional Data Mining Methodology
Found in: Data Mining Workshops, International Conference on
By Olivier Thonnard, Marc Dacier
Issue Date:December 2008
pp. 154-163
This paper describes a multi-dimensional knowledge discovery and data mining (KDD) methodology that aims at discovering actionable knowledge related to Internet threats, taking into account domain expert guidance and the integration of domain-specific inte...
 
Inside the SCAM Jungle: A Closer Look at 419 Scam Email Operations
Found in: 2013 IEEE CS Security and Privacy Workshops (SPW2013)
By Jelena Isacenkova,Olivier Thonnard,Andrei Costin,Davide Balzarotti,Aurelien Francillon
Issue Date:May 2013
pp. 143-150
Nigerian scam is a popular form of fraud in which the fraudster tricks the victim into paying a certain amount of money under the promise of a future, larger payoff. Using a public dataset, in this paper we study how these forms of scam campaigns are organ...
   
VisTracer: a visual analytics tool to investigate routing anomalies in traceroutes
Found in: Proceedings of the Ninth International Symposium on Visualization for Cyber Security (VizSec '12)
By Fabian Fischer, Florian Mansmann, Johannes Fuchs, Olivier Thonnard, Pierre-Antoine Vervier
Issue Date:October 2012
pp. 80-87
Routing in the Internet is vulnerable to attacks due to the insecure design of the border gateway protocol (BGP). One possible exploitation of this insecure design is the hijacking of IP blocks. Such hijacked IP blocks can then be used to conduct malicious...
     
Visual spam campaigns analysis using abstract graphs representation
Found in: Proceedings of the Ninth International Symposium on Visualization for Cyber Security (VizSec '12)
By Dimitrios Tzovaras, Olivier Thonnard, Orestis Tsigkas
Issue Date:October 2012
pp. 64-71
In this work we present a visual analytics tool introducing a new kind of graph visualization that exploits the nodes' degree to provide a simplified and more abstract, yet accurate, representation of the most important elements of a security data set and ...
     
Addressing the attack attribution problem using knowledge discovery and multi-criteria fuzzy decision-making
Found in: Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics (CSI-KDD '09)
By Marc Dacier, Olivier Thonnard, Wim Mees
Issue Date:June 2009
pp. 11-21
In network traffic monitoring, and more particularly in the realm of threat intelligence, the problem of "attack attribution" refers to the process of effectively attributing new attack events to (un)-known phenomena, based on some evidence or traces left ...
     
 1