Network forensic frameworks: Survey and research challenges
Network forensics is the science that deals with capture, recording, and analysis of network
traffic for detecting intrusions and investigating them. This paper makes an exhaustive …
traffic for detecting intrusions and investigating them. This paper makes an exhaustive …
Darknet as a source of cyber intelligence: Survey, taxonomy, and characterization
Today, the Internet security community largely emphasizes cyberspace monitoring for the
purpose of generating cyber intelligence. In this paper, we present a survey on darknet. The …
purpose of generating cyber intelligence. In this paper, we present a survey on darknet. The …
[PDF][PDF] A survey on honeypot software and data analysis
A Survey on Honeypot Software and Data Analysis Page 1 A Survey on Honeypot Software and
Data Analysis Marcin Nawrocki ∗ , Matthias Wählisch ∗ , Thomas C. Schmidt † , Christian Keil ‡ …
Data Analysis Marcin Nawrocki ∗ , Matthias Wählisch ∗ , Thomas C. Schmidt † , Christian Keil ‡ …
Averaged dependence estimators for DoS attack detection in IoT networks
Wireless sensor networks (WSNs) have evolved to become an integral part of the
contemporary Internet of Things (IoT) paradigm. The sensor node activities of both sensing …
contemporary Internet of Things (IoT) paradigm. The sensor node activities of both sensing …
Predicting cyber attack rates with extreme values
It is important to understand to what extent, and in what perspectives, cyber attacks can be
predicted. Despite its evident importance, this problem was not investigated until very …
predicted. Despite its evident importance, this problem was not investigated until very …
A survey on cyber situation-awareness systems: Framework, techniques, and insights
Cyberspace is full of uncertainty in terms of advanced and sophisticated cyber threats that
are equipped with novel approaches to learn the system and propagate themselves, such as …
are equipped with novel approaches to learn the system and propagate themselves, such as …
[PDF][PDF] A survey: Recent advances and future trends in honeypot research
ML Bringer, CA Chelmecki, H Fu**oki - International Journal of …, 2012 - mecs-press.org
This paper presents a survey on recent advances in honeypot research from a review of 80+
papers on honeypots and related topics mostly published after year 2005. This paper …
papers on honeypots and related topics mostly published after year 2005. This paper …
Modeling and clustering attacker activities in IoT through machine learning techniques
With the rise of the Internet of Things, malicious attacks pose serious threats to the massive
vulnerable IoT devices. Recently, attackers have initiated increasingly coordinated attack …
vulnerable IoT devices. Recently, attackers have initiated increasingly coordinated attack …
[KSIĄŻKA][B] Honeypots: a new paradigm to information security
RC Joshi, A Sardana - 2011 - books.google.com
A well-rounded, accessible exposition of honeypots in wired and wireless networks, this
book addresses the topic from a variety of perspectives. Following a strong theoretical …
book addresses the topic from a variety of perspectives. Following a strong theoretical …
Changing the game: The art of deceiving sophisticated attackers
N Virvilis, B Vanautgaerden… - 2014 6th International …, 2014 - ieeexplore.ieee.org
The number and complexity of cyber-attacks has been increasing steadily in the last years.
Adversaries are targeting the communications and information systems (CIS) of government …
Adversaries are targeting the communications and information systems (CIS) of government …