Botnet communication patterns

G Vormayr, T Zseby, J Fabini - IEEE Communications Surveys & …, 2017 - ieeexplore.ieee.org
Malicious botnets have become a common threat and pervade large parts of the Internet
today. Existing surveys and taxonomies focus on botnet topologies, command and control …

Domain and website attribution beyond WHOIS

S Sebastián, RG Diugan, J Caballero… - Proceedings of the 39th …, 2023 - dl.acm.org
Currently, WHOIS is the main method for identifying which company or individual owns a
domain or website. But, WHOIS usefulness is limited due to privacy protection services and …

Distributed attack deployment capability for modern automated penetration testing

J Hance, J Milbrath, N Ross, J Straub - Computers, 2022 - mdpi.com
Cybersecurity is an ever-changing landscape. The threats of the future are hard to predict
and even harder to prepare for. This paper presents work designed to prepare for the …

Discovering command and control channels using reinforcement learning

C Wang, A Kakkar, C Redino, A Rahman… - SoutheastCon …, 2023 - ieeexplore.ieee.org
Command and control (C2) paths for issuing commands to malware are sometimes the only
indicators of its existence within networks. Identifying potential C2 channels is often a …

[PDF][PDF] Beyond SolarWinds: The Systemic Risks of Critical Infrastructures, State of Play, Future Directions.

S Raponi, M Caprolu, R Di Pietro - ITASEC, 2021 - ceur-ws.org
The just concluded 16th edition of the World Economic Forum's Global Risks Report has
ranked Cybersecurity failure as a significant global threat. This awakening is not surprising …

An Advanced Approach for Detecting Behavior-Based Intranet Attacks by Machine Learning

M Jang, K Lee - IEEE Access, 2024 - ieeexplore.ieee.org
To address continuously increasing cyber threats, security professionals within
organizations are fortifying internal security by implementing security policies such as …

Finding and extracting crypto routines from malware

F Leder, P Martini, A Wichmann - 2009 IEEE 28th International …, 2009 - ieeexplore.ieee.org
In this paper we present a new approach for identifying the crypto routines in different types
of malware. In traditional malware analysis, like sandboxing, network data is examined as …

Ngbpa next generation botnet protocol analysis

FS Leder, P Martini - Emerging Challenges for Security, Privacy and Trust …, 2009 - Springer
The command & control (c&c) protocols of botnets are moving away from plaintext IRC
communicationt towards encrypted and obfuscated protocols. In general, these protocols are …

Real-time forensics through endpoint visibility

P Kieseberg, S Neuner, S Schrittwieser… - Digital Forensics and …, 2018 - Springer
In the course of the last years, there has been an established forensic process in place
known by every investigator and researcher. This traditional process is regarded to produce …

Development of an Autonomous Retesting Penetration Testing Paradigm

J Straub - 2022 International Conference on Computational …, 2022 - ieeexplore.ieee.org
This paper presents a paradigm for automating penetration testing for the purpose of
retesting systems to ensure that previously detected issues have not been reintroduced. This …