scispace - formally typeset
S

Shishir Nagaraja

Researcher at University of Strathclyde

Publications -  62
Citations -  1081

Shishir Nagaraja is an academic researcher from University of Strathclyde. The author has contributed to research in topics: Computer science & Malware. The author has an hindex of 15, co-authored 51 publications receiving 966 citations. Previous affiliations of Shishir Nagaraja include Indraprastha Institute of Information Technology & University of Illinois at Urbana–Champaign.

Papers
More filters
Proceedings Article

BotGrep: finding P2P bots with structured graph analysis

TL;DR: Experimental results on synthetic topologies embedded within Internet traffic traces from an ISP's backbone network indicate that these techniques can localize the majority of bots with low false positive rate and are resilient to incomplete visibility arising from partial deployment of monitoring systems and measurement inaccuracies from dynamics of background traffic.
Journal ArticleDOI

On the Security of Machine Learning in Malware C&C Detection: A Survey

TL;DR: This work first systematize works in the field of C8C detection and then, using existing models from the literature, go on toSystematize attacks against the ML components used in these approaches, to analyze the evasion resilience of these detection techniques.
Book ChapterDOI

Stegobot: a covert social network botnet

TL;DR: Analysis of Stegobot's network throughput indicates that stealthy as it is, it is also functionally powerful - capable of channeling fair quantities of sensitive data from its victims to the botmaster at tens of megabytes every month.
Journal ArticleDOI

A Survey of Timing Channels and Countermeasures

TL;DR: This survey considers all three canonical applications of timing channels, namely, covert communication, timing side channel, and network flow watermarking and surveys the theoretical foundations, the implementation, and the various detection and prevention techniques that have been reported in literature.
Book ChapterDOI

New strategies for revocation in ad-hoc networks

TL;DR: An even more radical strategy is considered - suicide attacks - in which a node on perceiving another node to be misbehaving simply declares both of them to be dead, and other nodes thereafter ignore them both.