Taxonomy and survey of collaborative intrusion detection
The dependency of our society on networked computers has become frightening: In the
economy, all-digital networks have turned from facilitators to drivers; as cyber-physical …
economy, all-digital networks have turned from facilitators to drivers; as cyber-physical …
Assessing and augmenting SCADA cyber security: A survey of techniques
SCADA systems monitor and control critical infrastructures of national importance such as
power generation and distribution, water supply, transportation networks, and manufacturing …
power generation and distribution, water supply, transportation networks, and manufacturing …
[PDF][PDF] Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection
Botnets are now the key platform for many Internet attacks, such as spam, distributed denial-
of-service (DDoS), identity theft, and phishing. Most of the current botnet detection …
of-service (DDoS), identity theft, and phishing. Most of the current botnet detection …
Automatic analysis of malware behavior using machine learning
Malicious software–so called malware–poses a major threat to the security of computer
systems. The amount and diversity of its variants render classic security defenses ineffective …
systems. The amount and diversity of its variants render classic security defenses ineffective …
BotSniffer: Detecting botnet command and control channels in network traffic
Botnets are now recognized as one of the most serious security threats. In contrast to
previous malware, botnets have the characteristic of a command and control (C&C) channel …
previous malware, botnets have the characteristic of a command and control (C&C) channel …
Bothunter: Detecting malware infection through ids-driven dialog correlation.
We present a new kind of network perimeter monitoring strategy, which focuses on
recognizing the infection and coordination dialog that occurs during a successful malware …
recognizing the infection and coordination dialog that occurs during a successful malware …
Toward automated dynamic malware analysis using cwsandbox
Malware is notoriously difficult to combat because it appears and spreads so quickly. In this
article, we describe the design and implementation of CWSandbox, a malware analysis tool …
article, we describe the design and implementation of CWSandbox, a malware analysis tool …
[PDF][PDF] Scalable, behavior-based malware clustering.
Anti-malware companies receive thousands of malware samples every day. To process this
large quantity, a number of automated analysis tools were developed. These tools execute a …
large quantity, a number of automated analysis tools were developed. These tools execute a …
Learning and classification of malware behavior
Malicious software in form of Internet worms, computer viruses, and Trojan horses poses a
major threat to the security of networked systems. The diversity and amount of its variants …
major threat to the security of networked systems. The diversity and amount of its variants …
Automated classification and analysis of internet malware
Numerous attacks, such as worms, phishing, and botnets, threaten the availability of the
Internet, the integrity of its hosts, and the privacy of its users. A core element of defense …
Internet, the integrity of its hosts, and the privacy of its users. A core element of defense …