Miguel Vargas Martin

Learn More
Network intrusion detection has been generally dealt with using sophisticated software and statistical analysis, although sometimes it has to be done by administrators, either by detecting the intruders in real time or by revising network logs, making this a tedious and timeconsuming task. To support this, intrusion detection analysis has been carried out(More)
In this paper, we propose a novel single-solution based metaheuristic algorithm called Simulated Raindrop (SRD). The SRD algorithm is inspired by the principles of raindrops. When rain falls on the land, it normally flows from higher altitude to a lower due to gravity, while choosing the optimum path towards the lowest point on the landscape. We compared(More)
Teaching network intrusion detection, or NID (the identification of violations of a security policy in a computer network) is a challenging task, because students need to analyze many data from network logs and in real time to identify patterns of network attacks, making these activities visually tiring. This paper describes an ongoing research concerned(More)
Wireless communication channels using the 802.11 protocol adopt the RTS/CTS mechanism to avoid collisions in the channel and to increase throughput. In a perfect scenario with no data loss, there exists a linear relationship between number of the valid frames received and the RTS received in the receiver. We propose a detection mechanism that keeps track of(More)
We present a monitoring system which detects repeated packets in network traffic, and has applications including detecting computer worms. It uses Bloom filters with counters. The system analyzes traffic in routers of a network. Our preliminary evaluation of the system involved traffic from our internal lab and a well known historical data set. After(More)
Recent voice over Internet protocol (VoIP) technology is attracting more and more attention and interest in the industry. VoIP applications such as IP telephony systems involve sending voice transmissions as data packets over private or public IP networks as well as reassembled and decoded on the receiving side. Security concerns are always the major(More)
Child pornography is an increasingly visible problem in society today. Methods currently employed to combat it may be considered primitive and inefficient, and legal and technical issues can exacerbate the problem significantly. We explore the area from social and technical perspectives, and call for viable solutions based upon distributed network(More)
Network intrusion detection has been generally dealt with sophisticated software and statistical analysis, although sometimes it has to be done by administrators, either by detecting the intruders in real time or by revising network logs, making this a tedious and time-consuming labor. To support this, intrusion detection analysis has been carried out using(More)