A survey on systems security metrics

M Pendleton, R Garcia-Lebron, JH Cho… - ACM Computing Surveys …, 2016 - dl.acm.org
Security metrics have received significant attention. However, they have not been
systematically explored based on the understanding of attack-defense interactions, which …

A survey on malicious domains detection through DNS data analysis

Y Zhauniarovich, I Khalil, T Yu, M Dacier - ACM Computing Surveys …, 2018 - dl.acm.org
Malicious domains are one of the major resources required for adversaries to run attacks
over the Internet. Due to the important role of the Domain Name System (DNS), extensive …

A visualized botnet detection system based deep learning for the internet of things networks of smart cities

R Vinayakumar, M Alazab, S Srinivasan… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Internet of Things applications for smart cities have currently become a primary target for
advanced persistent threats of botnets. This article proposes a botnet detection system …

Privacy policies over time: Curation and analysis of a million-document dataset

R Amos, G Acar, E Lucherini, M Kshirsagar… - Proceedings of the Web …, 2021 - dl.acm.org
Automated analysis of privacy policies has proved a fruitful research direction, with
developments such as automated policy summarization, question answering systems, and …

Predicting domain generation algorithms with long short-term memory networks

J Woodbridge, HS Anderson, A Ahuja… - arxiv preprint arxiv …, 2016 - arxiv.org
Various families of malware use domain generation algorithms (DGAs) to generate a large
number of pseudo-random domain names to connect to a command and control (C&C) …

A LSTM based framework for handling multiclass imbalance in DGA botnet detection

D Tran, H Mac, V Tong, HA Tran, LG Nguyen - Neurocomputing, 2018 - Elsevier
In recent years, botnets have become a major threat on the Internet. Most sophisticated bots
use Domain Generation Algorithms (DGA) to pseudo-randomly generate a large number of …

Reading the tea leaves: A comparative analysis of threat intelligence

VG Li, M Dunn, P Pearce, D McCoy… - 28th USENIX security …, 2019 - usenix.org
The term" threat intelligence" has swiftly become a staple buzzword in the computer security
industry. The entirely reasonable premise is that, by compiling up-to-date information about …

Adversarial defense: DGA-based botnets and DNS homographs detection through integrated deep learning

V Ravi, M Alazab, S Srinivasan… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
Cybercriminals use domain generation algorithms (DGAs) to prevent their servers from
being potentially blacklisted or shut down. Existing reverse engineering techniques for DGA …

An analysis of phishing blacklists: Google safe browsing, openphish, and phishtank

S Bell, P Komisarczuk - … of the Australasian Computer Science Week …, 2020 - dl.acm.org
Blacklists play a vital role in protecting internet users against phishing attacks. The
effectiveness of blacklists depends on their size, scope, update speed and frequency, and …

A different cup of {TI}? the added value of commercial threat intelligence

X Bouwman, H Griffioen, J Egbers, C Doerr… - 29th USENIX security …, 2020 - usenix.org
Commercial threat intelligence is thought to provide unmatched coverage on attacker
behavior, but it is out of reach for many organizations due to its hefty price tag. This paper …