[HTML][HTML] Cybercrime threat intelligence: A systematic multi-vocal literature review

G Cascavilla, DA Tamburri, WJ Van Den Heuvel - Computers & Security, 2021 - Elsevier
Significant cybersecurity and threat intelligence analysts agree that online criminal activity is
increasing exponentially. To offer an overview of the techniques and indicators to perform …

Cyber scanning: a comprehensive survey

E Bou-Harb, M Debbabi, C Assi - Ieee communications surveys …, 2013 - ieeexplore.ieee.org
Cyber scanning refers to the task of probing enterprise networks or Internet wide services,
searching for vulnerabilities or ways to infiltrate IT assets. This misdemeanor is often the …

Methods, systems, and media for detecting covert malware

BM Bowen, PV Prabhu, VP Kemerlis… - US Patent …, 2013 - Google Patents
Methods, systems, and media for detecting covert malware are provided. In accordance with
some embodiments, a method for detecting covert malware in a computing environ ment is …

[PDF][PDF] A survey on honeypot software and data analysis

M Nawrocki, M Wählisch, TC Schmidt, C Keil… - arxiv preprint arxiv …, 2016 - arxiv.org
A Survey on Honeypot Software and Data Analysis Page 1 A Survey on Honeypot Software and
Data Analysis Marcin Nawrocki ∗ , Matthias Wählisch ∗ , Thomas C. Schmidt † , Christian Keil ‡ …

Method and system for detecting malicious and/or botnet-related domain names

R Perdisci, W Lee - US Patent 10,027,688, 2018 - Google Patents
A method and system of detecting a malicious and/or botnet-related domain name,
comprising: reviewing a domain name used in Domain Name System (DNS) traffic in a …

Methods, systems, and media for baiting inside attackers

SJ Stolfo, AD Keromytis, BM Bowen… - US Patent …, 2015 - Google Patents
2009-12-05 Assigned to THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF
NEW YORK reassignment THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF …

Method and system for detecting and responding to attacking networks

D Dagon, N Feamster, W Lee, R Edmonds… - US Patent …, 2013 - Google Patents
A system and method for detecting a first network of compromised computers in a second
network of computers, comprising: collecting Domain Name System (DNS) data for the …

Methods, systems, and media for masquerade attack detection by monitoring computer user behavior

SJ Stolfo, MB Salem, S Hershkop - US Patent 8,769,684, 2014 - Google Patents
Methods, systems, and media for masquerade attack detec tion by monitoring computer user
behavior are provided. In accordance with some embodiments, a method for detecting …

[KIRJA][B] Virtual honeypots: from botnet tracking to intrusion detection

N Provos, T Holz - 2007 - books.google.com
Honeypots have demonstrated immense value in Internet security, but physical honeypot
deployment can be prohibitively complex, time-consuming, and expensive. Now, there'sa …

Systems and methods for detecting and inhibiting attacks using honeypots

S Sidiroglou, AD Keromytis… - US Patent 7,904,959, 2011 - Google Patents
In accordance with some embodiments, systems and methods that protect an application
from attacks are provided. In some embodiments, traffic from a communication network is …