Conversion Between Computer Network Protocols using Graph Matching Technique

1993 ◽  
Vol 39 (5) ◽  
pp. 291-303
Author(s):  
D Saha ◽  
P Dhar
2018 ◽  
Vol 46 ◽  
pp. 118-129 ◽  
Author(s):  
Sepideh Almasi ◽  
Alexandra Lauric ◽  
Adel Malek ◽  
Eric L. Miller

2005 ◽  
Vol 37 (3) ◽  
pp. 306-310
Author(s):  
Pilu Crescenzi ◽  
Giorgio Gambosi ◽  
Gaia Innocenti

Author(s):  
ALIREZA AHMADYFARD ◽  
JOSEF KITTLER

We propose a graph-based representation for the elliptic region shape descriptors introduced by Tuytelaars et al.13 In this representation we use image profiles to describe the relation between a pair of image regions. This new representation and a graph matching technique proposed in Ref. 1 are the basis of an object recognition method. An experimental comparative study between the original method and the new graph-based method is carried out. The results show that the graph-based method is more robust to scaling than the original method. Moreover, the misclassification rate using the graph-based method is considerably lower than that yielded by the original method.


2013 ◽  
Vol 411-414 ◽  
pp. 559-562 ◽  
Author(s):  
Chalida Liamwiset ◽  
Vatanawood Wiwat

Detection of design patterns in software design phase possibly ensures the non-functional requirements, regarding performance features, before investing the implementation. We formalize the structural UML class diagram using graph. By applying graph matching technique, we propose an alternative of subgraph matching algorithm to extract the local properties of the UML class diagrams and perform the detecting of subgraph of possible design patterns found in the target software design model.


2007 ◽  
Vol 9 (3) ◽  
pp. 44-57 ◽  
Author(s):  
Sebastian Zander ◽  
Grenville Armitage ◽  
Philip Branch

10.29007/c4wj ◽  
2019 ◽  
Author(s):  
Tirthankar Ghosh ◽  
Eman El-Sheikh ◽  
Wasseem Jammal

Botnet communications are obfuscated within legitimate network protocols to avoid detection and remediation. Domain Name Service (DNS) is a protocol of choice to hide communication with Command & Control (C&C) servers, where botmasters tunnel these communications within DNS request and response. Since botnet communications are characterized by different features, botmasters may evade detection methods by modifying some of these features. This paper proposes a multi-staged detection approach for Domain Generation Algorithm (DGA) using domain fluxing, Fast Flux Service Network (FFSN), and encrypted DNS tunneled-based botnets using BRO Network Security Monitor. This approach is able to detect DNS-tunneled botnet communications by analyzing different techniques used to find C&C servers, and also using signature matching technique to detect DNS-tunneled SSH handshake between bots and C&C servers.


Sign in / Sign up

Export Citation Format

Share Document