[HTML][HTML] Behavioral analysis of cybercrime: Paving the way for effective policing strategies

G Sarkar, SK Shukla - Journal of Economic Criminology, 2023 - Elsevier
This comprehensive survey paper offers a panoramic exploration of the dynamic realm of
cybercrime policing, encompassing a wide spectrum of intricacies from cybercrime …

A survey of phishing attack techniques, defence mechanisms and open research challenges

AK Jain, BB Gupta - Enterprise Information Systems, 2022 - Taylor & Francis
Phishing is an identity theft, which deceives Internet users into revealing their sensitive data,
eg, login information, credit/debit card details, and so on. Researchers have developed …

Graph based anomaly detection and description: a survey

L Akoglu, H Tong, D Koutra - Data mining and knowledge discovery, 2015 - Springer
Detecting anomalies in data is a vital task, with numerous high-impact applications in areas
such as security, finance, health care, and law enforcement. While numerous techniques …

Realtime robust malicious traffic detection via frequency domain analysis

C Fu, Q Li, M Shen, K Xu - Proceedings of the 2021 ACM SIGSAC …, 2021 - dl.acm.org
Machine learning (ML) based malicious traffic detection is an emerging security paradigm,
particularly for zero-day attack detection, which is complementary to existing rule based …

Paint it black: Evaluating the effectiveness of malware blacklists

M Kührer, C Rossow, T Holz - … in Attacks, Intrusions and Defenses: 17th …, 2014 - Springer
Blacklists are commonly used to protect computer systems against the tremendous number
of malware threats. These lists include abusive hosts such as malware sites or botnet …

Manufacturing compromise: the emergence of exploit-as-a-service

C Grier, L Ballard, J Caballero, N Chachra… - Proceedings of the …, 2012 - dl.acm.org
We investigate the emergence of the exploit-as-a-service model for driveby browser
compromise. In this regime, attackers pay for an exploit kit or service to do the" dirty work" of …

Automatically detecting vulnerable websites before they turn malicious

K Soska, N Christin - … USENIX Security Symposium (USENIX Security 14 …, 2014 - usenix.org
Significant recent research advances have made it possible to design systems that can
automatically determine with high accuracy the maliciousness of a target website. While …

[PDF][PDF] Nazca: Detecting Malware Distribution in Large-Scale Networks.

L Invernizzi, S Miskovic, R Torres, C Kruegel, S Saha… - NDSS, 2014 - cs.umd.edu
Malware remains one of the most significant security threats on the Internet. Antivirus
solutions and blacklists, the main weapons of defense against these attacks, have only been …

Throwing darts in the dark? detecting bots with limited data using neural data augmentation

STK Jan, Q Hao, T Hu, J Pu, S Oswal… - … IEEE symposium on …, 2020 - ieeexplore.ieee.org
Machine learning has been widely applied to building security applications. However, many
machine learning models require the continuous supply of representative labeled data for …

Dial one for scam: A large-scale analysis of technical support scams

N Miramirkhani, O Starov, N Nikiforakis - arxiv preprint arxiv:1607.06891, 2016 - arxiv.org
In technical support scams, cybercriminals attempt to convince users that their machines are
infected with malware and are in need of their technical support. In this process, the victims …