

Agent-Controller based Security Infrastructure for Enterprise Network
Abstract
Keywords
References
R. Langner, “Stuxnet: Dissecting a Cyberwarfare Weapon,” IEEE Security and Privacy Magazine, Vol. 9, No. 3, pp. 49-51, May 2011.
D. P. Fidler, “Was Stuxnet an Act of War? Decoding a Cyber attack,” IEEE Security and Privacy Magazine, Vol. 9, No. 4, pp. 56-59, April 2011.
E. Chien, L. OMurchu, and N. Falliere, “W32.Duqu: The Precursor to the Next Stuxnet,” Proceedings of the 5th USENIX Conference on Large-Scale Exploits and Emergent Threats 2012 (LEET 2012), April 2012.
M. S. Vinay and Manoj Balakrishnan, “A Comparison of Three Sophisticated Cyber Weapons,” in Managing Trust in Cyberspace, Edited by S. Thampi, Bharat Bhargava, and P. Atrey, Taylor Francis, USA, December 2013.
A. Cardenas, S. Amin, Z.-S. Lin, Y.-L. Hua, and S. Sastry, “Attacks Against Process Control Systems: Risk Assessment, Detection, and Response,” Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security 2011, pp.355-366, March 2011.
D.Andriesse, and H.Bos, Än Analysis of the Zeus Peer-to-Peer Protocol,"Technical Report IR-CS-74, May 2013
B.Thanudas, S.Sreelal, and V.Cyril Raj, "Survey of Botnets and Detection Methodologies on an Enterprise Network," Proceedings of National Conference on Innovative Computing Tecchniques NCICT 2014, April 2014.
Jiawei Han and Micheline Kamber, “Data Mining: Concepts and Techniques,” Morgan Kufmann, 3rd Edition 2011.
B.Thanudas, Sheena.S.Rajan, S.Sreelal, and B.S. manoj, "A survey on Botnet Detection Techniques," Proccedings of ISRO Conference on Computers and Information Technology-2015(ISCIT-2015), March 2015.
Rohit Tyagi, Tuhin Paul, BS Manoj, and B.Thanudas, “A Novel HTTP Botnet Traffic Detection Method,” IIST-VSSC Technical Report, December 2014.
Rohit Tyagi, Tuhin Paul, BS Manoj, and B.Thanudas, “Fast-flux Botnet Detection from Network Traffic,” 2014 Annual IEEE Conference (INDICON), December 2014, IEEE Xplore.
Rohit Tyagi, Tuhin Paul, BS Manoj and B. Thanudas, “Packet Inspection for Unauthorized OS Detection in Enterprises,” accepted for publication in IEEE Security and Privacy Magazine, 2015.
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.