The impacts of artificial intelligence techniques in augmentation of cybersecurity: a comprehensive review

B Naik, A Mehta, H Yagnik, M Shah - Complex & Intelligent Systems, 2022 - Springer
Given the prevailing state of cybersecurity, it is reasonable to understand why cybersecurity
experts are seriously considering artificial intelligence as a potential field that can aid …

Yamme: a yara-byte-signatures metamorphic mutation engine

A Coscia, V Dentamaro, S Galantucci… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Recognition of known malicious patterns through signature-based systems is unsuccessful
against malware for which no known signature exists to identify them. These include not only …

Comparing attack models for it systems: Lockheed martin's cyber kill chain, mitre att&ck framework and diamond model

N Naik, P Jenkins, P Grace… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Cyberattacks are a serious challenge for any IT system, which motivates cybersecurity
professionals and developers to constantly explore various attack models to analyse the …

Threat hunting architecture using a machine learning approach for critical infrastructures protection

M Aragonés Lozano, I Pérez Llopis… - Big data and cognitive …, 2023 - mdpi.com
The number and the diversity in nature of daily cyber-attacks have increased in the last few
years, and trends show that both will grow exponentially in the near future. Critical …

Fuzzy-import hashing: A static analysis technique for malware detection

N Naik, P Jenkins, N Savage, L Yang… - Forensic Science …, 2021 - Elsevier
The advent of new malware types and their attack vectors poses serious challenges for
security experts in discovering effective malware detection and analysis techniques. The …

Android Malware Classification Based on Fuzzy Hashing Visualization

H Rodriguez-Bazan, G Sidorov… - Machine Learning and …, 2023 - mdpi.com
The proliferation of Android-based devices has brought about an unprecedented surge in
mobile application usage, making the Android ecosystem a prime target for cybercriminals …

Application of the SAMA methodology to Ryuk malware

AG Masid, JB Higuera, JRB Higuera… - Journal of Computer …, 2023 - Springer
Malware analysis is an essential discipline for understanding the nature, attack vectors, and
weaknesses of systems to combat the threats that emerge every day in the IT security world …

Cybercrime specialization: An exposé of a malicious Android Obfuscation-as-a-Service

V Šembera, M Paquet-Clouston… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
Malware authors constantly obfuscate their files and defenders regularly develop new
techniques to detect them. Given this cat-and-mouse game, specialized obfuscation services …

Assessing the effectiveness of yara rules for signature-based malware detection and classification

A Lockett - arxiv preprint arxiv:2111.13910, 2021 - arxiv.org
Malware often uses obfuscation techniques or is modified slightly to evade signature
detection from antivirus software and malware analysis tools. Traditionally, to determine if a …

Cyberattack analysis utilising attack tree with weighted mean probability and risk of attack

N Naik, P Jenkins, P Grace, S Prajapat, D Naik… - UK Workshop on …, 2023 - Springer
As technology advances and AI becomes embedded and accepted into everyday life, the
risk of cyberattacks by adversaries increases. These cyberattacks are ubiquitous affecting …