A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

The privacy implications of cyber security systems: A technological survey

E Toch, C Bettini, E Shmueli, L Radaelli… - ACM Computing …, 2018 - dl.acm.org
Cyber-security systems, which protect networks and computers against cyber attacks, are
becoming common due to increasing threats and government regulation. At the same time …

Realtime robust malicious traffic detection via frequency domain analysis

C Fu, Q Li, M Shen, K Xu - Proceedings of the 2021 ACM SIGSAC …, 2021 - dl.acm.org
Machine learning (ML) based malicious traffic detection is an emerging security paradigm,
particularly for zero-day attack detection, which is complementary to existing rule based …

Measuring the changing cost of cybercrime

R Anderson, C Barton, R Böhme… - The 18th Annual …, 2019 - research.ed.ac.uk
In 2012 we presented the first systematic study of the costs of cybercrime. In this paper, we
report what has changed in the seven years since. The period has seen major platform …

Detecting unknown encrypted malicious traffic in real time via flow interaction graph analysis

C Fu, Q Li, K Xu - arxiv preprint arxiv:2301.13686, 2023 - arxiv.org
In this paper, we propose HyperVision, a realtime unsupervised machine learning (ML)
based malicious traffic detection system. Particularly, HyperVision is able to detect unknown …

Optimized invariant representation of network traffic for detecting unseen malware variants

K Bartos, M Sofka, V Franc - 25th USENIX Security Symposium (USENIX …, 2016 - usenix.org
New and unseen polymorphic malware, zero-day attacks, or other types of advanced
persistent threats are usually not detected by signature-based security devices, firewalls, or …

Chainsmith: Automatically learning the semantics of malicious campaigns by mining threat intelligence reports

Z Zhu, T Dumitras - … IEEE European symposium on security and …, 2018 - ieeexplore.ieee.org
Modern cyber attacks consist of a series of steps and are generally part of larger campaigns.
Large-scale field data provides a quantitative measurement of these campaigns. On the …

Outguard: Detecting in-browser covert cryptocurrency mining in the wild

A Kharraz, Z Ma, P Murley, C Lever, J Mason… - The World Wide Web …, 2019 - dl.acm.org
In-browser cryptojacking is a form of resource abuse that leverages end-users' machines to
mine cryptocurrency without obtaining the users' consent. In this paper, we design …

" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences

D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …

Detecting phishing sites using chatgpt

T Koide, N Fukushi, H Nakano, D Chiba - arxiv preprint arxiv:2306.05816, 2023 - arxiv.org
The rise of large language models (LLMs) has had a significant impact on various domains,
including natural language processing and artificial intelligence. While LLMs such as …