Phillip Porras

ORCID: 0000-0003-4661-2443
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Software-Defined Networks and 5G
  • Internet Traffic Analysis and Secure E-voting
  • Security and Verification in Computing
  • Software System Performance and Reliability
  • Spam and Phishing Detection
  • Information and Cyber Security
  • Anomaly Detection Techniques and Applications
  • Cloud Computing and Resource Management
  • Software Engineering Research
  • Opportunistic and Delay-Tolerant Networks
  • Data Quality and Management
  • Web Application Security Vulnerabilities
  • Bluetooth and Wireless Communication Technologies
  • Simulation Techniques and Applications
  • Cloud Data Security Solutions
  • Caching and Content Delivery
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Distributed and Parallel Computing Systems
  • Advanced Memory and Neural Computing
  • Complex Network Analysis Techniques
  • IPv6, Mobility, Handover, Networks, Security
  • Network Traffic and Congestion Control
  • Cryptography and Data Security

SRI International
2015-2024

Menlo School
2013-2024

Kwangwoon University
2023

Korea Advanced Institute of Science and Technology
2023

Incheon National University
2023

Dankook University
2023

Texas A&M University
2013-2023

Mitchell Institute
2013

The Aerospace Corporation
1995-2003

University of California, Santa Barbara
1991-2003

The paper presents a new approach to representing and detecting computer penetrations in real time. approach, called state transition analysis, models as series of changes that lead from an initial secure target compromised state. State diagrams, the graphical representation penetrations, identify precisely requirements for compromise penetration present only critical events must occur successful completion penetration. diagrams are written correspond states actual system, these form basis...

10.1109/32.372146 article EN IEEE Transactions on Software Engineering 1995-03-01

Among the leading reference implementations of Software Defined Networking (SDN) paradigm is OpenFlow framework, which decouples control plane into a centralized application. In this paper, we consider two aspects that pose security challenges, and propose solutions could address these concerns. The first challenge inherent communication bottleneck arises between data plane, an adversary exploit by mounting "control saturation attack" disrupts network operations. Indeed, even well-mined...

10.1145/2508859.2516684 article EN 2013-01-01

AI techniques play an important role in automated malware classification. Several machine-learning methods have been applied to classify or cluster into families, based on different features derived from dynamic review of the malware. While these approaches demonstrate promise, they are themselves subject a growing array counter measures that increase cost capturing binary features. Further, feature extraction requires time investment per does not scale well daily volume instances being...

10.1145/2046684.2046689 article EN 2011-10-21

Within the hierarchy of Software Defined Network (SDN) network stack, control layer operates as critical middleware facilitator interactions between data plane and applications, which govern flow routing decisions. In OpenFlow implementation SDN model, layer, commonly referred to a operating system (NOS), has been realized by range competing implementations that offer various performance functionality advantages: Floodlight, POX, NOX, ONIX. this paper we focus on question resilience, when...

10.1145/2660267.2660353 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2014-11-03

The paper describes an expert system development toolset called the Production-Based Expert System Toolset (P-BEST) and how it is employed in of a modern generic signature analysis engine for computer network misuse detection. For more than decade, earlier versions P-BEST have been used intrusion detection research some most well known systems, but this first time principles language are described to wide audience. We present rule sets detecting subversion methods against which there few...

10.1109/secpri.1999.766911 article EN 2003-01-20

Web-based surreptitious malware infections (i.e., drive-by downloads) have become the primary method used to deliver malicious software onto computers across Internet. To address this threat, we present a browser independent operating system kernel extension designed eliminate driveby installations. The BLADE (Block All Drive-by download Exploits) asserts that all executable files delivered through downloads must result from explicit user consent and transparently redirects every unconsented...

10.1145/1866307.1866356 article EN 2010-10-04

The OpenFlow (OF) switching specification represents an innovative and open standard for enabling the dynamic programming of flow control policies in production networks. Unfortunately, thus far researchers have paid little attention to development methods verifying that inserted within network do not violate network's underlying security policy. We introduce Flover, a model checking system which verifies aggregate instantiated does implemented Flover using Yices SMT solver, we then...

10.1109/icc.2013.6654813 article EN 2013-06-01

Emerging software defined network (SDN) stacks have introduced an entirely new attack surface that is exploitable from a wide range of launch points. Through analysis the various strategies reported in prior work, and through our own efforts to enumerate variant strategies, we gained two insights. First, observe different SDN controller implementations, developed independently by groups, seem manifest common sets pitfalls design weakness enable extensive set attacks compiled this paper....

10.1109/tnet.2017.2748159 article EN publisher-specific-oa IEEE/ACM Transactions on Networking 2017-09-21

A new approach to representing computer penetrations is introduced called penetration state transition analysis. This models as a series of transitions described in terms signature actions and descriptions. State diagrams are written correspond the states an actual system, these form basis rule-based expert system for detecting penetrations, referred STAT.< <ETX xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">&gt;</ETX>

10.1109/csac.1992.228217 article EN 2003-01-02

We consider the problem of identifying obscure chat-like botnet command and control (C & C) communications, which are indistinguishable from human-human communication using traditional signature-based techniques. Existing passive-behavior-based anomaly detection techniques limited because they either require monitoring multiple bot-infected machines that belong to same or extended times. In this paper, we explore potential use active probing in a network middle-box as means augment...

10.1109/acsac.2009.30 article EN Annual Computer Security Applications Conference 2009-12-01
Coming Soon ...