A review of state-of-the-art malware attack trends and defense mechanisms

J Ferdous, R Islam, A Mahboubi, MZ Islam - IEEe Access, 2023 - ieeexplore.ieee.org
The increasing sophistication of malware threats has led to growing concerns in the anti-
malware community, as malware poses a significant danger to online users despite the …

A survey of protocol fuzzing

X Zhang, C Zhang, X Li, Z Du, B Mao, Y Li… - ACM Computing …, 2024 - dl.acm.org
Communication protocols form the bedrock of our interconnected world, yet vulnerabilities
within their implementations pose significant security threats. Recent developments have …

Shadewatcher: Recommendation-guided cyber threat analysis using system audit records

J Zengy, X Wang, J Liu, Y Chen, Z Liang… - … IEEE symposium on …, 2022 - ieeexplore.ieee.org
System auditing provides a low-level view into cyber threats by monitoring system entity
interactions. In response to advanced cyber-attacks, one prevalent solution is to apply data …

Euler: Detecting Network Lateral Movement via Scalable Temporal Link Prediction

IJ King, HH Huang - ACM Transactions on Privacy and Security, 2023 - dl.acm.org
Lateral movement is a key stage of system compromise used by advanced persistent
threats. Detecting it is no simple task. When network host logs are abstracted into discrete …

Toward early and accurate network intrusion detection using graph embedding

X Hu, W Gao, G Cheng, R Li, Y Zhou… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Early and accurate detection of network intrusions is crucial to ensure network security and
stability. Existing network intrusion detection methods mainly use conventional machine …

[HTML][HTML] Unraveled—A semi-synthetic dataset for Advanced Persistent Threats

S Myneni, K Jha, A Sabur, G Agrawal, Y Deng… - Computer Networks, 2023 - Elsevier
U nraveled is a novel cybersecurity dataset capturing Advanced Persistent Threat (APT)
attacks not available in the public domain. Existing cybersecurity datasets lack coherent …

eAudit: A Fast, Scalable and Deployable Audit Data Collection System*

R Sekar, H Kimm, R Aich - 2024 IEEE Symposium on Security …, 2024 - ieeexplore.ieee.org
Today's advanced cyber attack campaigns can often bypass all existing protections. The
primary defense against them is after-the-fact detection, followed by a forensic analysis to …

Raptor: advanced persistent threat detection in industrial iot via attack stage correlation

A Kumar, VLL Thing - … on Privacy, Security and Trust (PST), 2023 - ieeexplore.ieee.org
Past Advanced Persistent Threat (APT) attacks on Industrial Internet-of-Things (IIoT), such as
the 2016 Ukrainian power grid attack and the 2017 Saudi petrochemical plant attack, have …

HGHAN: Hacker group identification based on heterogeneous graph attention network

Y Xu, Y Fang, C Huang, Z Liu - Information Sciences, 2022 - Elsevier
The hacker group identification is an important pre-work for tasks such as hacking tracing,
criminal portraits. The current hacker identification mainly relies on fingerprints and clue …

Paced: Provenance-based automated container escape detection

M Abbas, S Khan, A Monum, F Zaffar… - 2022 IEEE …, 2022 - ieeexplore.ieee.org
The security of container-based microservices relies heavily on the isolation of operating
system resources that is provided by namespaces. However, vulnerabilities exist in the …