2012
DOI: 10.1007/978-3-642-33338-5_18
|View full text |Cite
|
Sign up to set email alerts
|

N-Gram against the Machine: On the Feasibility of the N-Gram Network Analysis for Binary Protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
56
0
3

Year Published

2014
2014
2019
2019

Publication Types

Select...
5
3
2

Relationship

1
9

Authors

Journals

citations
Cited by 72 publications
(60 citation statements)
references
References 17 publications
1
56
0
3
Order By: Relevance
“…They demonstrated the effectiveness of the detection mechanisms on text protocols, but they did not test them against binary protocols. Industrial control systems mainly use binary protocols and studies such as [7] highlight the problems of using n-gram analysis in industrial control environments.…”
Section: Related Workmentioning
confidence: 99%
“…They demonstrated the effectiveness of the detection mechanisms on text protocols, but they did not test them against binary protocols. Industrial control systems mainly use binary protocols and studies such as [7] highlight the problems of using n-gram analysis in industrial control environments.…”
Section: Related Workmentioning
confidence: 99%
“…The deep integration of software security into the development process and the engineering lessons from software practitioners have no substitute. Hadžiosmanović et al (2012) discovered that vulnerabilities in Industrial Control Systems (ICSs), which include nuclear power plants and oil and gas extraction and distribution facilities, have increased mainly because of poor software development cycles used by several vendors and the "security by obscurity" paradigm used to "protect" legacy devices. Dobariya and Gajjar (2012) noted that one of the challenges in VoIP is that poor software development can lead to various security problems.…”
Section: Software Security and Cbsdmentioning
confidence: 99%
“…An n-gram is a sequence of n consecutive bytes obtained from a longer string. The use of n-grams has been widely explored in the intrusion detection area, although it presents some limitations too [20].…”
Section: Anomaly-based Nidsmentioning
confidence: 99%