tag:blogger.com,1999:blog-4088979.post963015433124177362..comments2023-10-16T06:06:25.012-04:00Comments on TaoSecurity Blog: Advice for Academic ResearchersRichard Bejtlichhttp://www.blogger.com/profile/13512184196416665417noreply@blogger.comBlogger5125tag:blogger.com,1999:blog-4088979.post-10535901161007696142010-02-24T17:55:08.395-05:002010-02-24T17:55:08.395-05:00I think using Honeypots for Botnet Detection/Track...I think using Honeypots for Botnet Detection/Tracking, Spambot/Webbot detection and so on, is a hot topic for research and develop..Adelhttps://www.blogger.com/profile/07539168753759395522noreply@blogger.comtag:blogger.com,1999:blog-4088979.post-36762805261202186052010-02-21T23:46:36.648-05:002010-02-21T23:46:36.648-05:00Internet traffic classification (using machine lea...Internet traffic classification (using machine learning) is a research topic of a Phd student in our University group.Silvio Cesarehttps://www.blogger.com/profile/05591476967547245238noreply@blogger.comtag:blogger.com,1999:blog-4088979.post-74656242472840548432010-02-20T18:18:49.698-05:002010-02-20T18:18:49.698-05:00For the 1-3 year timeframe, I recommend developing...For the 1-3 year timeframe, I recommend developing a plugin for the new OISF Suricata or Snort engine which facilitates true Layer-7 decoding for very specific web apps. Specifically, I'd like to have rules that are Facebook, Hotmail, Gmail, etc. action specific. As in, a plugin that allows the creation of rules to say "alert when someone posts the same message to their entire contact list" for various web apps. Emerging Threats Snort sigs exist currently for generic Facebook message posts, but building a framework for quickly interpreting web apps is where the next-gen stuff needs to be. Flow tools are becoming irrelevant as malware increasingly uses legitimate web services to both propagate and operate.Martinhttps://www.blogger.com/profile/03975313410819886706noreply@blogger.comtag:blogger.com,1999:blog-4088979.post-25309146206067433162010-02-20T11:20:03.058-05:002010-02-20T11:20:03.058-05:00Data leak prevention toolsData leak prevention toolsThe Ubiquitous Mr. Lovegroovehttps://www.blogger.com/profile/16715623535008048201noreply@blogger.comtag:blogger.com,1999:blog-4088979.post-82614374241097762892010-02-20T10:02:56.518-05:002010-02-20T10:02:56.518-05:00Agreed Richard.
It's really about using tec...Agreed Richard. <br /><br />It's really about using techniques such as analytics and business intelligence to understand not just the activity on the network, but also the behavior elements of who is communicating over the network.Porterhttps://www.blogger.com/profile/09370283484079690949noreply@blogger.com