A comprehensive survey of recent internet measurement techniques for cyber security
MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …
vulnerable to its security flaws. Despite substantial efforts to address many of these …
The privacy implications of cyber security systems: A technological survey
Cyber-security systems, which protect networks and computers against cyber attacks, are
becoming common due to increasing threats and government regulation. At the same time …
becoming common due to increasing threats and government regulation. At the same time …
Realtime robust malicious traffic detection via frequency domain analysis
Machine learning (ML) based malicious traffic detection is an emerging security paradigm,
particularly for zero-day attack detection, which is complementary to existing rule based …
particularly for zero-day attack detection, which is complementary to existing rule based …
Measuring the changing cost of cybercrime
In 2012 we presented the first systematic study of the costs of cybercrime. In this paper, we
report what has changed in the seven years since. The period has seen major platform …
report what has changed in the seven years since. The period has seen major platform …
Detecting unknown encrypted malicious traffic in real time via flow interaction graph analysis
In this paper, we propose HyperVision, a realtime unsupervised machine learning (ML)
based malicious traffic detection system. Particularly, HyperVision is able to detect unknown …
based malicious traffic detection system. Particularly, HyperVision is able to detect unknown …
Optimized invariant representation of network traffic for detecting unseen malware variants
New and unseen polymorphic malware, zero-day attacks, or other types of advanced
persistent threats are usually not detected by signature-based security devices, firewalls, or …
persistent threats are usually not detected by signature-based security devices, firewalls, or …
Chainsmith: Automatically learning the semantics of malicious campaigns by mining threat intelligence reports
Modern cyber attacks consist of a series of steps and are generally part of larger campaigns.
Large-scale field data provides a quantitative measurement of these campaigns. On the …
Large-scale field data provides a quantitative measurement of these campaigns. On the …
Outguard: Detecting in-browser covert cryptocurrency mining in the wild
In-browser cryptojacking is a form of resource abuse that leverages end-users' machines to
mine cryptocurrency without obtaining the users' consent. In this paper, we design …
mine cryptocurrency without obtaining the users' consent. In this paper, we design …
" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …
seemingly contradictory results and expands the boundaries of known discoveries …
Detecting phishing sites using chatgpt
The rise of large language models (LLMs) has had a significant impact on various domains,
including natural language processing and artificial intelligence. While LLMs such as …
including natural language processing and artificial intelligence. While LLMs such as …