Taxonomy and survey of collaborative intrusion detection

E Vasilomanolakis, S Karuppayah… - ACM computing …, 2015 - dl.acm.org
The dependency of our society on networked computers has become frightening: In the
economy, all-digital networks have turned from facilitators to drivers; as cyber-physical …

Assessing and augmenting SCADA cyber security: A survey of techniques

S Nazir, S Patel, D Patel - Computers & Security, 2017 - Elsevier
SCADA systems monitor and control critical infrastructures of national importance such as
power generation and distribution, water supply, transportation networks, and manufacturing …

[PDF][PDF] Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection

G Gu, R Perdisci, J Zhang, W Lee - 2008 - usenix.org
Botnets are now the key platform for many Internet attacks, such as spam, distributed denial-
of-service (DDoS), identity theft, and phishing. Most of the current botnet detection …

Automatic analysis of malware behavior using machine learning

K Rieck, P Trinius, C Willems… - Journal of computer …, 2011 - content.iospress.com
Malicious software–so called malware–poses a major threat to the security of computer
systems. The amount and diversity of its variants render classic security defenses ineffective …

BotSniffer: Detecting botnet command and control channels in network traffic

G Gu, J Zhang, W Lee - 2008 - corescholar.libraries.wright.edu
Botnets are now recognized as one of the most serious security threats. In contrast to
previous malware, botnets have the characteristic of a command and control (C&C) channel …

Bothunter: Detecting malware infection through ids-driven dialog correlation.

G Gu, PA Porras, V Yegneswaran, MW Fong… - USENIX Security …, 2007 - usenix.org
We present a new kind of network perimeter monitoring strategy, which focuses on
recognizing the infection and coordination dialog that occurs during a successful malware …

Toward automated dynamic malware analysis using cwsandbox

C Willems, T Holz, F Freiling - IEEE Security & Privacy, 2007 - ieeexplore.ieee.org
Malware is notoriously difficult to combat because it appears and spreads so quickly. In this
article, we describe the design and implementation of CWSandbox, a malware analysis tool …

[PDF][PDF] Scalable, behavior-based malware clustering.

U Bayer, PM Comparetti, C Hlauschek, C Kruegel… - NDSS, 2009 - eurecom.eu
Anti-malware companies receive thousands of malware samples every day. To process this
large quantity, a number of automated analysis tools were developed. These tools execute a …

Learning and classification of malware behavior

K Rieck, T Holz, C Willems, P Düssel… - … Conference on Detection …, 2008 - Springer
Malicious software in form of Internet worms, computer viruses, and Trojan horses poses a
major threat to the security of networked systems. The diversity and amount of its variants …

Automated classification and analysis of internet malware

M Bailey, J Oberheide, J Andersen, ZM Mao… - Recent Advances in …, 2007 - Springer
Numerous attacks, such as worms, phishing, and botnets, threaten the availability of the
Internet, the integrity of its hosts, and the privacy of its users. A core element of defense …