A survey on systems security metrics
Security metrics have received significant attention. However, they have not been
systematically explored based on the understanding of attack-defense interactions, which …
systematically explored based on the understanding of attack-defense interactions, which …
A survey on malicious domains detection through DNS data analysis
Malicious domains are one of the major resources required for adversaries to run attacks
over the Internet. Due to the important role of the Domain Name System (DNS), extensive …
over the Internet. Due to the important role of the Domain Name System (DNS), extensive …
A visualized botnet detection system based deep learning for the internet of things networks of smart cities
R Vinayakumar, M Alazab, S Srinivasan… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Internet of Things applications for smart cities have currently become a primary target for
advanced persistent threats of botnets. This article proposes a botnet detection system …
advanced persistent threats of botnets. This article proposes a botnet detection system …
Privacy policies over time: Curation and analysis of a million-document dataset
Automated analysis of privacy policies has proved a fruitful research direction, with
developments such as automated policy summarization, question answering systems, and …
developments such as automated policy summarization, question answering systems, and …
Predicting domain generation algorithms with long short-term memory networks
Various families of malware use domain generation algorithms (DGAs) to generate a large
number of pseudo-random domain names to connect to a command and control (C&C) …
number of pseudo-random domain names to connect to a command and control (C&C) …
A LSTM based framework for handling multiclass imbalance in DGA botnet detection
In recent years, botnets have become a major threat on the Internet. Most sophisticated bots
use Domain Generation Algorithms (DGA) to pseudo-randomly generate a large number of …
use Domain Generation Algorithms (DGA) to pseudo-randomly generate a large number of …
Reading the tea leaves: A comparative analysis of threat intelligence
The term" threat intelligence" has swiftly become a staple buzzword in the computer security
industry. The entirely reasonable premise is that, by compiling up-to-date information about …
industry. The entirely reasonable premise is that, by compiling up-to-date information about …
Adversarial defense: DGA-based botnets and DNS homographs detection through integrated deep learning
V Ravi, M Alazab, S Srinivasan… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
Cybercriminals use domain generation algorithms (DGAs) to prevent their servers from
being potentially blacklisted or shut down. Existing reverse engineering techniques for DGA …
being potentially blacklisted or shut down. Existing reverse engineering techniques for DGA …
An analysis of phishing blacklists: Google safe browsing, openphish, and phishtank
Blacklists play a vital role in protecting internet users against phishing attacks. The
effectiveness of blacklists depends on their size, scope, update speed and frequency, and …
effectiveness of blacklists depends on their size, scope, update speed and frequency, and …
A different cup of {TI}? the added value of commercial threat intelligence
Commercial threat intelligence is thought to provide unmatched coverage on attacker
behavior, but it is out of reach for many organizations due to its hefty price tag. This paper …
behavior, but it is out of reach for many organizations due to its hefty price tag. This paper …