Botnet communication patterns
Malicious botnets have become a common threat and pervade large parts of the Internet
today. Existing surveys and taxonomies focus on botnet topologies, command and control …
today. Existing surveys and taxonomies focus on botnet topologies, command and control …
Domain and website attribution beyond WHOIS
Currently, WHOIS is the main method for identifying which company or individual owns a
domain or website. But, WHOIS usefulness is limited due to privacy protection services and …
domain or website. But, WHOIS usefulness is limited due to privacy protection services and …
Distributed attack deployment capability for modern automated penetration testing
J Hance, J Milbrath, N Ross, J Straub - Computers, 2022 - mdpi.com
Cybersecurity is an ever-changing landscape. The threats of the future are hard to predict
and even harder to prepare for. This paper presents work designed to prepare for the …
and even harder to prepare for. This paper presents work designed to prepare for the …
Discovering command and control channels using reinforcement learning
Command and control (C2) paths for issuing commands to malware are sometimes the only
indicators of its existence within networks. Identifying potential C2 channels is often a …
indicators of its existence within networks. Identifying potential C2 channels is often a …
[PDF][PDF] Beyond SolarWinds: The Systemic Risks of Critical Infrastructures, State of Play, Future Directions.
The just concluded 16th edition of the World Economic Forum's Global Risks Report has
ranked Cybersecurity failure as a significant global threat. This awakening is not surprising …
ranked Cybersecurity failure as a significant global threat. This awakening is not surprising …
An Advanced Approach for Detecting Behavior-Based Intranet Attacks by Machine Learning
M Jang, K Lee - IEEE Access, 2024 - ieeexplore.ieee.org
To address continuously increasing cyber threats, security professionals within
organizations are fortifying internal security by implementing security policies such as …
organizations are fortifying internal security by implementing security policies such as …
Finding and extracting crypto routines from malware
F Leder, P Martini, A Wichmann - 2009 IEEE 28th International …, 2009 - ieeexplore.ieee.org
In this paper we present a new approach for identifying the crypto routines in different types
of malware. In traditional malware analysis, like sandboxing, network data is examined as …
of malware. In traditional malware analysis, like sandboxing, network data is examined as …
Ngbpa next generation botnet protocol analysis
FS Leder, P Martini - Emerging Challenges for Security, Privacy and Trust …, 2009 - Springer
The command & control (c&c) protocols of botnets are moving away from plaintext IRC
communicationt towards encrypted and obfuscated protocols. In general, these protocols are …
communicationt towards encrypted and obfuscated protocols. In general, these protocols are …
Real-time forensics through endpoint visibility
In the course of the last years, there has been an established forensic process in place
known by every investigator and researcher. This traditional process is regarded to produce …
known by every investigator and researcher. This traditional process is regarded to produce …
Development of an Autonomous Retesting Penetration Testing Paradigm
J Straub - 2022 International Conference on Computational …, 2022 - ieeexplore.ieee.org
This paper presents a paradigm for automating penetration testing for the purpose of
retesting systems to ensure that previously detected issues have not been reintroduced. This …
retesting systems to ensure that previously detected issues have not been reintroduced. This …