Home // ICIMP

ICIMP 2016, The Eleventh International Conference on Internet Monitoring and Protection

Type: conference

Notes: IARIA Conference.

Editors:
Jaime Lloret Mauri, Polytechnic University of Valencia, Spain
Mario Freire, University of Beira Interior, Portugal

ISSN: 2308-3980

ISBN: 978-1-61208-475-6

Location: Valencia, Spain

Dates: from May 22, 2016 to May 26, 2016

Articles: there are 7 articles

Code-Stop: Code-Reuse Prevention by Context-Aware Traffic Proxying
Terrence OConnor and William Enck
keywords: code-reuse attacks; return-oriented programming; intrusion prevention system; proxy

Detecting Obfuscated JavaScripts Using Machine Learning
Simon Aebersold, Krzysztof Kryszczuk, Sergio Paganoni, Bernhard Tellenbach, and Timothy Trowbridge
keywords: Computer security; Machine learning; Pattern analysis; Classification algorithms; JavaScript, Random Forest; Malicious

Performance Study of a Software Defined Network Emulator
Jose M. Jimenez, Oscar Romero, Albert Rego, Avinash Dilendra, and Jaime Lloret
keywords: SDN; OpenFlow; Mininet; MTU; virtualization; bandwidth; jitter.

A Study on How to Characterize TCP Congestion Control Algorithms from Unidirectional Packet Traces
Toshihiko Kato, Leelianou Yongxialee, Ryo Yamamoto, and Satoshi Ohzahata
keywords: TCP congestion control; passive monitoring; unidirectional trace; congestion window.

Intrusion Detection Using Indicators of Compromise Based on Best Practices and Windows Event Logs
María del Carmen Prudente Tixteco, Lidia Prudente Tixteco, Gabriel Sánchez Pérez, and Linda Karina Toscano Medina
keywords: indicators of compromise; windows event logs; intrusion detection

Comparative Study of Routing Protocols in Ring Topologies Using GNS3
Roberto Alejandro Larrea-Luzuriaga, Jose M. Jimenez, Sandra Sendra, and Jaime Lloret
keywords: Routing Protocol; Convergence time; RIP; OSPF; EIGRP; GNS3; Network Performance.

Enhancing Network Security Environment by Empowering Modeling and Simulation Strategy (Cyber Protect Simulation Lesson Learned)
Rudy Agus Gemilang Gultom and Baskoro Alrianto
keywords: cyber protect simulation; threats, attacks and vulnerabilities; countermeasures strategy; network security framework and models