Network forensic frameworks: Survey and research challenges

ES Pilli, RC Joshi, R Niyogi - digital investigation, 2010 - Elsevier
Network forensics is the science that deals with capture, recording, and analysis of network
traffic for detecting intrusions and investigating them. This paper makes an exhaustive …

Darknet as a source of cyber intelligence: Survey, taxonomy, and characterization

C Fachkha, M Debbabi - IEEE Communications Surveys & …, 2015 - ieeexplore.ieee.org
Today, the Internet security community largely emphasizes cyberspace monitoring for the
purpose of generating cyber intelligence. In this paper, we present a survey on darknet. The …

[PDF][PDF] A survey on honeypot software and data analysis

M Nawrocki, M Wählisch, TC Schmidt, C Keil… - arxiv preprint arxiv …, 2016 - arxiv.org
A Survey on Honeypot Software and Data Analysis Page 1 A Survey on Honeypot Software and
Data Analysis Marcin Nawrocki ∗ , Matthias Wählisch ∗ , Thomas C. Schmidt † , Christian Keil ‡ …

Averaged dependence estimators for DoS attack detection in IoT networks

ZA Baig, S Sanguanpong, SN Firdous… - Future Generation …, 2020 - Elsevier
Wireless sensor networks (WSNs) have evolved to become an integral part of the
contemporary Internet of Things (IoT) paradigm. The sensor node activities of both sensing …

Predicting cyber attack rates with extreme values

Z Zhan, M Xu, S Xu - IEEE Transactions on Information …, 2015 - ieeexplore.ieee.org
It is important to understand to what extent, and in what perspectives, cyber attacks can be
predicted. Despite its evident importance, this problem was not investigated until very …

A survey on cyber situation-awareness systems: Framework, techniques, and insights

H Alavizadeh, J Jang-Jaccard, SY Enoch… - ACM Computing …, 2022 - dl.acm.org
Cyberspace is full of uncertainty in terms of advanced and sophisticated cyber threats that
are equipped with novel approaches to learn the system and propagate themselves, such as …

[PDF][PDF] A survey: Recent advances and future trends in honeypot research

ML Bringer, CA Chelmecki, H Fu**oki - International Journal of …, 2012 - mecs-press.org
This paper presents a survey on recent advances in honeypot research from a review of 80+
papers on honeypots and related topics mostly published after year 2005. This paper …

Modeling and clustering attacker activities in IoT through machine learning techniques

P Sun, J Li, MZA Bhuiyan, L Wang, B Li - Information Sciences, 2019 - Elsevier
With the rise of the Internet of Things, malicious attacks pose serious threats to the massive
vulnerable IoT devices. Recently, attackers have initiated increasingly coordinated attack …

[KSIĄŻKA][B] Honeypots: a new paradigm to information security

RC Joshi, A Sardana - 2011 - books.google.com
A well-rounded, accessible exposition of honeypots in wired and wireless networks, this
book addresses the topic from a variety of perspectives. Following a strong theoretical …

Changing the game: The art of deceiving sophisticated attackers

N Virvilis, B Vanautgaerden… - 2014 6th International …, 2014 - ieeexplore.ieee.org
The number and complexity of cyber-attacks has been increasing steadily in the last years.
Adversaries are targeting the communications and information systems (CIS) of government …