Skip to main content

Showing 1–4 of 4 results for author: Mazel, J

.
  1. arXiv:2201.10371  [pdf, other

    cs.CR cs.NI

    ML-based tunnel detection and tunneled application classification

    Authors: Johan Mazel, Matthieu Saudrais, Antoine Hervieu

    Abstract: Encrypted tunneling protocols are widely used. Beyond business and personal uses, malicious actors also deploy tunneling to hinder the detection of Command and Control and data exfiltration. A common approach to maintain visibility on tunneling is to rely on network traffic metadata and machine learning to analyze tunnel occurrence without actually decrypting data. Existing work that address tunne… ▽ More

    Submitted 25 January, 2022; originally announced January 2022.

  2. arXiv:2103.15708  [pdf, other

    cs.CR

    Dynamically Modelling Heterogeneous Higher-Order Interactions for Malicious Behavior Detection in Event Logs

    Authors: Corentin Larroche, Johan Mazel, Stephan Clémençon

    Abstract: Anomaly detection in event logs is a promising approach for intrusion detection in enterprise networks. By building a statistical model of usual activity, it aims to detect multiple kinds of malicious behavior, including stealthy tactics, techniques and procedures (TTPs) designed to evade signature-based detection systems. However, finding suitable anomaly detection methods for event logs remains… ▽ More

    Submitted 28 June, 2022; v1 submitted 29 March, 2021; originally announced March 2021.

  3. arXiv:1908.04193  [pdf, other

    cs.CR

    Identifying and characterizing ZMap scans: a cryptanalytic approach

    Authors: Johan Mazel, Rémi Strullu

    Abstract: Network scanning tools play a major role in Internet security. They are used by both network security researchers and malicious actors to identify vulnerable machines exposed on the Internet. ZMap is one of the most common probing tools for high-speed Internet-wide scanning. We present novel identification methods based on the IPv4 iteration process of ZMap. These methods can be used to identify Z… ▽ More

    Submitted 13 August, 2019; v1 submitted 12 August, 2019; originally announced August 2019.

  4. arXiv:1712.06850  [pdf, other

    cs.CR cs.CY

    A comparison of web privacy protection techniques

    Authors: Johan Mazel, Richard Garnier, Kensuke Fukuda

    Abstract: A comparison of web privacy protection techniques

    Submitted 19 December, 2017; originally announced December 2017.