no code implementations • 24 Mar 2016 • Zhenxin Zhan, Maochao Xu, Shouhuai Xu
In this paper, we propose the {\em first} statistical framework for rigorously analyzing honeypot-captured cyber attack data.
Cryptography and Security Applications
no code implementations • 8 Aug 2014 • Li Xu, Zhenxin Zhan, Shouhuai Xu, Keyin Ye
Within this framework, we show that an adaptive attacker can make malicious websites evade powerful detection models, but proactive training can be an effective counter-evasion defense mechanism.