Skip to main content

On the Reliability of Network Measurement Techniques Used for Malware Traffic Analysis (Transcript of Discussion)

  • Conference paper
  • First Online:
Book cover Security Protocols XXII (Security Protocols 2014)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8809))

Included in the following conference series:

  • 737 Accesses

Abstract

Morning everybody. I’m going to talk about work along with my PhD student, Joe Gardiner, who’s sitting here. A while back we surveyed the literature on targeted attacks and defenses, for the CPNI (Centre for the Protection of National Infrastructure, http://www.cpni.gov.uk/advice/cyber/idata/.), and we found a number of unsolved challenges in the area. One of them is the challenges of measurement in large scale networks, which this talk is about.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Centre for the Protection of National Infrastructure, http://www.cpni.gov.uk/advice/cyber/idata/.

  2. 2.

    http://blogs.msdn.com/b/tzink/archive/2012/06/08/evolution-of-the-antivirus-in dustry.aspx

  3. 3.

    http://www.caida.org/home/

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shishir Nagaraja .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Nagaraja, S. (2014). On the Reliability of Network Measurement Techniques Used for Malware Traffic Analysis (Transcript of Discussion). In: Christianson, B., Malcolm, J., Matyáš, V., Švenda, P., Stajano, F., Anderson, J. (eds) Security Protocols XXII. Security Protocols 2014. Lecture Notes in Computer Science(), vol 8809. Springer, Cham. https://doi.org/10.1007/978-3-319-12400-1_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-12400-1_32

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-12399-8

  • Online ISBN: 978-3-319-12400-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics