TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 15.

Böck, Leon and Vasilomanolakis, Emmanouil and Mühlhäuser, Max and Karuppayah, Shankar :
Next Generation P2P Botnets: Monitoring under Adverse Conditions.
[Online-Edition: https://www.raid2018.org/]
In: International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Heraklion, Crete, Greece. In: Lecture Notes in Computer Science , 11050 . Springer International Publishing
[Conference or Workshop Item] , (2018)

Vasilomanolakis, Emmanouil and Wolf, Jan Helge and Böck, Leon and Mühlhäuser, Max and Karuppayah, Shankar :
I Trust my Zombies: a Trust-enabled Botnet.
Blackhat Europe
[Conference or Workshop Item] , (2017)

Karuppayah, Shankar and Böck, Leon and Grube, Tim and Manickam, Selvakumar and Mühlhäuser, Max and Fischer, Mathias :
SensorBuster: On Identifying Sensor Nodes in P2P Botnets.
International Conference on Availability, Reliability and Security (ARES) ACM , New York, USA
[Conference or Workshop Item] , (2017)

Karuppayah, Shankar :
Advanced monitoring in P2P botnets.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5523]
Technische Universität Darmstadt , Darmstadt, Germany
[Ph.D. Thesis], (2016)

Karuppayah, Shankar and Vasilomanolakis, Emmanouil and Haas, Steffen and Fischer, Mathias and Mühlhäuser, Max :
BoobyTrap: On Autonomously Detecting and Characterizing Crawlers in P2P Botnets.
IEEE ICC Communication and Information Systems Security Symposium IEEE
[Conference or Workshop Item] , (2016)

Haas, Steffen and Karuppayah, Shankar and Manickam, Selvakumar and Mühlhäuser, Max and Fischer, Mathias :
On the resilience of P2P-based botnet graphs.
Communications and Network Security (CNS), 2016 IEEE Conference on
[Conference or Workshop Item] , (2016)

Böck, Leon and Karuppayah, Shankar and Grube, Tim and Fischer, Mathias and Mühlhäuser, Max :
Hide And Seek: Detecting Sensors in P2P Botnets.
Communications and Network Security (CNS), 2015 IEEE Conference on IEEE
[Conference or Workshop Item] , (2015)

Karuppayah, Shankar and Roos, Stefanie and Rossow, Christian and Fischer, Mathias and Mühlhäuser, Max :
ZeusMilker: Circumventing the P2P Zeus Neighbor List Restriction Mechanism.
International Conference in Distributed Computing Systems IEEE
[Conference or Workshop Item] , (2015)

Vasilomanolakis, Emmanouil and Karuppayah, Shankar and Mühlhäuser, Max and Fischer, Mathias :
Taxonomy and Survey of Collaborative Intrusion Detection.
In: ACM Computing Surveys
[Article] , (2015)

Vasilomanolakis, Emmanouil and Karuppayah, Shankar and Kikiras, Panayotis and Mühlhäuser, Max :
A honeypot-driven cyber incident monitor: lessons learned and steps ahead.
8th International Conference on Security of Information and Networks ACM
[Conference or Workshop Item] , (2015)

Vasilomanolakis, Emmanouil and Karuppayah, Shankar and Mühlhäuser, Max and Fischer, Mathias :
HosTaGe: a Mobile Honeypot for Collaborative Defense.
In: 7th International Conference on Security of Information and Networks. ACM New York, NY, USA
[Conference or Workshop Item] , (2014)

Karuppayah, Shankar and Fischer, Mathias and Rossow, Christian and Mühlhäuser, Max :
On Advanced Monitoring in Resilient and Unstructured P2P Botnets.
In: International Conference on Communications (ICC) - Communications and Information Systems Security Symposium (CISS).
[Conference or Workshop Item] , (2014)

Vasilomanolakis, Emmanouil and Karuppayah, Shankar and Fischer, Mathias and Mühlhäuser, Max and Plasoianu, Mihai and Pfeiffer, Wulf and Pandikow, Lars :
This Network is Infected: HosTaGe - a Low-Interaction Honeypot for Mobile Devices.
In: Proceedings of the third ACM workshop on Security and privacy in smartphones and mobile devices, New York, NY, USA. In: SPSM '13 . ACM , New York, NY, USA
[Conference or Workshop Item] , (2013)

Alomari, Esraa and Manickam, Selvakumar and Gupta, B. and Karuppayah, Shankar and Alfaris, Rafeef :
Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art.
In: International Journal of Computer Applications, 49 (7) pp. 24-32.
[Article] , (2012)

Karuppayah, Shankar and Samad, Fahad :
CAD+: Detecting Colluding Nodes in Gray Hole Attacks.
In: Lecture Notes in Informatics GI-Edition, S-10 (Informatiktage 2011) pp. 279-282.
[Article] , (2011)

This list was generated on Sat Apr 20 02:19:09 2019 CEST.