Domain name system security and privacy: A contemporary survey

A Khormali, J Park, H Alasmary, A Anwar, M Saad… - Computer Networks, 2021 - Elsevier
Abstract The Domain Name System (DNS) is one of the most important components of
today's Internet, and is the standard naming convention between human-readable domain …

Copycat: practical adversarial attacks on visualization-based malware detection

A Khormali, A Abusnaina, S Chen, DH Nyang… - arxiv preprint arxiv …, 2019 - arxiv.org
Despite many attempts, the state-of-the-art of adversarial machine learning on malware
detection systems generally yield unexecutable samples. In this work, we set out to examine …

Visual analytics for root dns data

E Krokos, A Rowden, K Whitley… - 2018 IEEE Symposium on …, 2018 - computer.org
The analysis of vast amounts of network data for monitoring and safeguarding a core pillar of
the internet, the root DNS, is an enormous challenge. Understanding the distribution of the …

KRAKEN: a knowledge-based recommender system for analysts, to kick exploration up a notch

R Brisse, S Boche, F Majorczyk, JF Lalande - International Conference on …, 2021 - Springer
During a computer security investigation, a security analyst has to explore the logs available
to understand what happened in the compromised system. For such tasks, visual analysis …

A cause-based classification approach for malicious DNS queries detected through blacklists

A Satoh, Y Nakamura, Y Fukuda, K Sasai… - IEEE …, 2019 - ieeexplore.ieee.org
Some of the most serious security threats facing computer networks involve malware. To
prevent this threat, administrators need to swiftly remove the infected machines from their …

Turning the Hunted into the Hunter via Threat Hunting: Life Cycle, Ecosystem, Challenges and the Great Promise of AI

C Hillier, T Karroubi - arxiv preprint arxiv:2204.11076, 2022 - arxiv.org
The threat hunting lifecycle is a complex atmosphere that requires special attention from
professionals to maintain security. This paper is a collection of recent work that gives a …

Analysis of the design space for cybersecurity visualizations in vizsec

A Komadina, Ž Mihajlović, S Groš - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
In this paper, we present research on the analysis of the design space for cybersecurity
visualizations in VizSec. At the beginning of this research, we analyzed 17 survey papers in …

Ostinato: Cross-host Attack Correlation Through Attack Activity Similarity Detection

SK Ghosh, K Satvat, R Gjomemo… - … on Information Systems …, 2022 - Springer
Modern attacks against enterprises often have multiple targets inside the enterprise network.
Due to the large size of these networks and increasingly stealthy attacks, attacker activities …

Overview of network security situation awareness based on big data

W Qian, H Lai, Q Zhu, KC Chang - Advanced Machine Learning …, 2021 - Springer
With the rapid development of Internet technology, network security issues have become
more complex and changeable. Situational awareness can dynamically reflect network …

[HTML][HTML] Визуальная аналитика для информационной безопасности: области применения, задачи и модели визуализации

ИВ Котенко, МВ Коломеец, КН Жернова… - Вопросы …, 2021 - cyberleninka.ru
Цель статьи: выявление и систематизация областей и задач информационной
безопасности, решаемых с использованием методов визуальной аналитики, а также …