
Cristian H. Martins de SouzaInstituto Federal de Educação, Ciência e Tecnologia do Rio Grande do Norte | IFRN · Área de Redes de Computadores
Cristian H. Martins de Souza
Computer Systems Networking
About
6
Publications
482
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3
Citations
Citations since 2017
Introduction
Currently working as a cyber security consultant in Brazil. Experienced in information security, system administration, computer vision, and image processing. Works on research projects since high school. Likes trying new tools and technologies, as well as developing new open-source projects to help the community. My research areas of interest are Information Security, Privacy, Malware Analysis, Software-Defined Networking, and AI.
Publications
Publications (6)
O paradigma das Redes Definidas por Software (SDN) vem sendo cada vez mais adotado nas infraestruturas de redes de computadores. No entanto, por se tratar de uma abordagem relativamente recente, poucas estratégias de segurança tem sido empregadas para sua proteção. Um dos problemas relacionados ao uso de SDN é a presença de ataques do tipo scanning...
Malware analysis is of utmost importance for information security. However, while many tools attempt to automate this process, few have a local installation option and a centralized environment for analyzing and exposing results. Furthermore, API query limitations and high license prices make these tools unattractive for newcomers to the field. Thi...
Ataques de fingerprinting constituem os primeiros passos no planejamento de ataques sofisticados em redes de computadores, como os ataques distribuídos de negação de serviço (DDoS, do inglês Distributed Denial of Service). Utilizar técnicas de alvo móvel (MTD, do inglês Moving Target Defense) em conjunto com a visão holística dos controladores das...
The expansion of the Internet has grown the possibilities for fraudulent actions. Among these possibilities, we highlight the phishing activity, created with the objective of capturing user's credentials through a false page similar to the original one. This work proposes PhishKiller, a tool capable of detecting and mitigating phishing attacks by m...
A expansão da Internet expandiu as possibilidades de ações fraudulentas. Entre essas ações, destaca-se a atividade de phishing, criada com o objetivo de capturar as credenciais do usuário através de uma página falsa similar à do serviço original. Diante disso, este trabalho propõe o PhishKiller, uma ferramenta capaz de detectar e mitigar ataques de...
With the constant technological evolution, every day human beings look for automated ways to guarantee the safety of certain places. Inevitably, the use of face recognition becomes an important mechanism for access control, since each person has practically unique face features. However, it is also necessary to develop tools together for a validati...