S
Shishir Nagaraja
Researcher at University of Strathclyde
Publications - 62
Citations - 1081
Shishir Nagaraja is an academic researcher from University of Strathclyde. The author has contributed to research in topics: Computer science & Malware. The author has an hindex of 15, co-authored 51 publications receiving 966 citations. Previous affiliations of Shishir Nagaraja include Indraprastha Institute of Information Technology & University of Illinois at Urbana–Champaign.
Papers
More filters
Proceedings Article
BotGrep: finding P2P bots with structured graph analysis
TL;DR: Experimental results on synthetic topologies embedded within Internet traffic traces from an ISP's backbone network indicate that these techniques can localize the majority of bots with low false positive rate and are resilient to incomplete visibility arising from partial deployment of monitoring systems and measurement inaccuracies from dynamics of background traffic.
Journal ArticleDOI
On the Security of Machine Learning in Malware C&C Detection: A Survey
Joseph Gardiner,Shishir Nagaraja +1 more
TL;DR: This work first systematize works in the field of C8C detection and then, using existing models from the literature, go on toSystematize attacks against the ML components used in these approaches, to analyze the evasion resilience of these detection techniques.
Book ChapterDOI
Stegobot: a covert social network botnet
Shishir Nagaraja,Amir Houmansadr,Pratch Piyawongwisal,Vijit Singh,Pragya Agarwal,Nikita Borisov +5 more
TL;DR: Analysis of Stegobot's network throughput indicates that stealthy as it is, it is also functionally powerful - capable of channeling fair quantities of sensitive data from its victims to the botmaster at tens of megabytes every month.
Journal ArticleDOI
A Survey of Timing Channels and Countermeasures
TL;DR: This survey considers all three canonical applications of timing channels, namely, covert communication, timing side channel, and network flow watermarking and surveys the theoretical foundations, the implementation, and the various detection and prevention techniques that have been reported in literature.
Book ChapterDOI
New strategies for revocation in ad-hoc networks
TL;DR: An even more radical strategy is considered - suicide attacks - in which a node on perceiving another node to be misbehaving simply declares both of them to be dead, and other nodes thereafter ignore them both.