Marc Ph. Stoecklin  Marc Ph. Stoecklin photo       

contact information

Principal RSM and Manager, Cognitive Cybersecurity Intelligence
T. J. Watson Research Center, Yorktown Heights, NY

links



2016

BotMeter: Charting DGA-Botnet Landscapes in Large Networks
Wang, Ting and Hu, Xin and Jang, Jiyong and Ji, Shouling and Stoecklin, Marc and Taylor, Teryl
Distributed Computing Systems (ICDCS), 2016 IEEE 36th International Conference on, pp. 334--343
Abstract

Closing the loop: Network and in-host monitoring tandem for comprehensive cloud security visibility
Stefan Berger, Yangyi Chen, Xin Hu, Dimitrios Pendarakis, Josyula R. Rao, Reiner Sailer, Douglas L. Schales, Marc Ph. Stoecklin
IBM Journal of Research and Development 60(4), 2016

Security intelligence for industrial control systems
Andreas Amrein, Valentino Angeletti, Anton Beitler, Marcel Német, Micha Reiser, Simone Riccetti, Marc Ph. Stoecklin, Andreas Wespi
IBM Journal of Research and Development 60(4), 2016

Scalable malware classification with multifaceted content features and threat intelligence
Xin Hu, Jiyong Jang, Ting Wang, Zubair Ashraf, Marc Ph. Stoecklin, Dhilung Kirat
IBM Journal of Research and Development 60(4), 2016

Passive security intelligence to analyze the security risks of mobile/BYOD activities
Marc Ph. Stoecklin, Kapil Singh, Larry Koved, Xin Hu, Suresh N. Chari, Josyula R. Rao, Pau-Chen Cheng; Mihai Christodorescu, Reiner Sailer, Douglas L. Schales
IBM Journal of Research and Development 60(4), 2016

Scalable analytics to detect DNS misuse for establishing stealthy communication channels
Douglas L. Schales, Jiyong Jang, Ting Wang, Xin Hu, Dhilung Kirat, Ben Wuest, Marc Ph. Stoecklin
IBM Journal of Research and Development 60(4), 2016

Security 360°: Enterprise security for the cognitive era
Josyula R. Rao, Suresh N. Chari, Dimitrios Pendarakis, Reiner Sailer, Marc Ph. Stoecklin, Wilfried Teiken, Andreas Wespi
IBM Journal of Research and Development 60(4), 2016

BAYWATCH: Robust Beaconing Detection to Identify Infected Hosts in Large-Scale Enterprise Networks
Xin Hu, Jiyong Jang, Marc Ph. Stoecklin, Ting Wang, Douglas L. Schales, Dhilung Kirat, and Josyula R. Rao
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'16), 2016.

Detecting Malicious Exploit Kits using Tree-based Similarity Searches
Teryl Taylor, Xin Hu, Ting Wang, Jiyong Jang, Marc Ph. Stoecklin, Fabian Monrose and Reiner Sailer
Proceedings of the 6th ACM Conference on Data and Application Security and Privacy (CODASPY '16), 2016

Hunting for Invisibility: Characterizing and Detecting Malicious Web Infrastructures through Server Visibility Analysis
Jialong Zhang, Xin Hu, Jiyong Jang, Ting Wang, Guofei Gu, Marc Ph. Stoecklin
Proceedings of IEEE International Conference on Computer Communications (INFOCOM'16), 2016


2015

FCCE: Highly Scalable Distributed Feature Collection and Correlation Engine for Low Latency Big Data Analytics
Douglas Schales, Xin Hu, Jiyong Jang, Reiner Sailer, Marc Ph. Stoecklin, and Ting Wang.
Proceedings of the 31st IEEE International Conference on Data Engineering (ICDE '15), 2015


2014

MUSE: asset risk scoring in enterprise network with mutually reinforced reputation propagation
Xin Hu, Ting Wang, Marc Stoecklin, Douglas L Schales, Jiyong Jang, Reiner Sailer
EURASIP Journal on Information Security, 2014

Stream Computing for Large-Scale, Multi-Channel Cyber Threat Analytics
Douglas Schales, Mihai Christodorescu, Xin Hu, Jiyong Jang, Josyula Rao, Reiner Sailer, Marc Stoecklin, Wietse Venema and Ting Wang
Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI'14)

Asset Risk Scoring in Enterprise Network with Mutually Reinforced Reputation Propagation
Xin Hu, Ting Wang, Marc Ph. Stoecklin, Douglas L. Schales, Jiyong Jang and Reiner Sailer
International Workshop on Cyber Crime (IWCC '14), 2014


2013

Practical Comprehensive Bounds on Surreptitious Communication Over DNS
Vern Paxson, Mihai Christodorescu, Mobin Javed Josyula Rao, Reiner Sailer, Douglas Schales, Marc Ph. Stoecklin, Kurt Thomas Wietse Venema, Nicholas Weaver
USENIX Security, 2013


2012



2011

Stream Computing for Large-Scale, Multi-Channel Cyber Threat Analytics: Architecture, Implementation, Deployment, and Lessons Learned
Douglas L Schales, Mihai Christodorescu, Josyula R Rao, Reiner Sailer, Marc Ph Stoecklin, Wietse Venema
IBM Technical Report, IBM Research Report, 2011


2010

Simply Top Talkers
J Massar, A Kind, M Ph Stoecklin
FloCon '10: Proc. of CERT FloCon Analysis Workshop, 2010

A flow trace generator using graph-based traffic classification techniques
Peter Siska, Marc Ph. Stoecklin, Andreas Kind, Thorsten Braun
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, pp. 457--462, 2010



2009

On the 95-percentile billing method
X. Dimitropoulos, P. Hurley, A. Kind, M.P. Stoecklin
Proceedings of Passive and Active Measurements (PAM) Conference, pp. 207-216, Springer, 2009

Histogram-based Traffic Anomaly Detection
Andreas Kind, Marc Ph. Stoecklin, Xenofontas Dimitropoulos
IEEE Transactions on Network and Service Management 6(2), 110--121, IEEE, 2009


2008

Dynamic Adaptation of Flow Information Granularity for Incident Analysis
Marc Ph. Stoecklin, Andreas Kind, Jean-Yves Le Boudec
FloCon '08: Proc. of CERT FloCon Analysis Workshop, 2008

The Eternal Sunshine of the Sketch Data Structure
X. Dimitropoulos, M. Stoecklin, P. Hurley, A. Kind
Computer Networks 52(17), 3248-3257, Elsevier, 2008

A Two-Layered Anomaly Detection Technique based on Multi-modal Flow Behavior Models
Marc Ph. Stoecklin, Jean-Yves Le Boudec, Andreas Kind
Proceedings of Passive and Active Measurements Conference, pp. 212--221, Springer, 2008


2006

Anomaly detection by finding feature distribution outliers
Marc Ph. Stoecklin
ACM CoNEXT '06: Proc. of ACM International Conference on emerging Networking EXperiments and Technologies [poster], pp. 32, 2006

Re-visited: Denial of service resilient access control for wireless sensor networks
Frederic Armknecht, Joao Girao, Marc Ph. Stoecklin, Dirk Westhoff
Security and Privacy in Ad-Hoc and Sensor Networks, 18--31, Springer, 2006