Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Daniel Sheleheda is active.

Publication


Featured researches published by Daniel Sheleheda.


high-assurance systems engineering | 2008

On the Comparison of Network Attack Datasets: An Empirical Analysis

Robin Berthier; Dave Korman; Michel Cukier; Matti A. Hiltunen; Gregg T. Vesonder; Daniel Sheleheda

Network malicious activity can be collected and reported by various sources using different attack detection solutions. The granularity of these solutions provides either very detailed information (intrusion detection systems, honeypots) or high-level trends (CAIDA, SANS). The problem for network security operators is often to select the sources of information to better protect their network. How much information from these sources is redundant and how much is unique? The goal of this paper is to show empirically that while some global attack events can be correlated across various sensors, the majority of incoming malicious activity has local specificities. This study presents a comparative analysis of four different attack datasets offering three different levels of granularity: 1) two high interaction honeynets deployed at two different locations (i.e., a corporate and an academic environment); 2) ATLAS which is a distributed network telescope from Arbor; and 3) Internet Protecttrade which is a global alerting service from AT&T.


Archive | 2008

Systems and Methods to Provide Location Information

Daniel Sheleheda; Cynthia Cama; Yih-Farn Chen; Rittwik Jana; Bernard S. Renger; Bin Wei


Archive | 2008

Method and apparatus for suppressing duplicate alarms

Daniel Sheleheda; Michael Singer


Archive | 2010

Systems for and methods for detecting url web tracking and consumer opt-out cookies

Daniel Sheleheda; Cynthia Cama


Archive | 2013

Method of detecting potential phishing by analyzing universal resource locators

Junlan Feng; Valerie Torres; Daniel Sheleheda


Archive | 2010

SYSTEMS FOR AND METHODS OF WEB PRIVACY PROTECTION

Daniel Sheleheda; Edward G. Amoroso; Cynthia Cama; John Donovan; Balachander Krishnamurthy; William A. O'Hern


Archive | 2008

METHODS, APPARATUS, AND COMPUTER PROGRAM PRODUCTS THAT MONITOR AND PROTECT HOME AND SMALL OFFICE NETWORKS FROM BOTNET AND MALWARE ACTIVITY

Daniel Sheleheda; Cynthia Cama


Archive | 2009

Method and System for Improving Website Security

Daniel Sheleheda; Edward G. Amoroso; Cynthia Cama; Junlan Feng; Gregory Leibolt; Sanjay MacWan; William A. O'Hern; Valerie Torres; Yuhong Yu


Archive | 2005

Method and apparatus for detecting anomalous network activities

Daniel Sheleheda; Michael Singer


Archive | 2011

Method and apparatus for machine to machine network security monitoring in a communications network

Daniel Sheleheda; Donald J. Bowen; Cynthia Cama; Lusheng Ji

Researchain Logo
Decentralizing Knowledge