Botnets: A survey
Botnets, which are networks formed by malware-compromised machines, have become a
serious threat to the Internet. Such networks have been created to conduct large-scale …
serious threat to the Internet. Such networks have been created to conduct large-scale …
Botnet communication patterns
Malicious botnets have become a common threat and pervade large parts of the Internet
today. Existing surveys and taxonomies focus on botnet topologies, command and control …
today. Existing surveys and taxonomies focus on botnet topologies, command and control …
Holmes: real-time apt detection through correlation of suspicious information flows
In this paper, we present HOLMES, a system that implements a new approach to the
detection of Advanced and Persistent Threats (APTs). HOLMES is inspired by several case …
detection of Advanced and Persistent Threats (APTs). HOLMES is inspired by several case …
Cyber threats to industrial IoT: a survey on attacks and countermeasures
In today's Industrial Internet of Things (IIoT) environment, where different systems interact
with the physical world, the state proposed by the Industry 4.0 standards can lead to …
with the physical world, the state proposed by the Industry 4.0 standards can lead to …
Tactical provenance analysis for endpoint detection and response systems
Endpoint Detection and Response (EDR) tools provide visibility into sophisticated intrusions
by matching system events against known adversarial behaviors. However, current solutions …
by matching system events against known adversarial behaviors. However, current solutions …
Cryptolock (and drop it): stop** ransomware attacks on user data
Ransomware is a growing threat that encrypts auser's files and holds the decryption key until
a ransom ispaid by the victim. This type of malware is responsible fortens of millions of …
a ransom ispaid by the victim. This type of malware is responsible fortens of millions of …
An empirical comparison of botnet detection methods
The results of botnet detection methods are usually presented without any comparison.
Although it is generally accepted that more comparisons with third-party methods may help …
Although it is generally accepted that more comparisons with third-party methods may help …
Fresco: Modular composable security services for software-defined networks
OpenFlow is an open standard that has gained tremendous interest in the last few years
within the network community. It is an embodiment of the software-defined networking …
within the network community. It is an embodiment of the software-defined networking …
Insomnia: Towards concept-drift robustness in network intrusion detection
Despite decades of research in network traffic analysis and incredible advances in artificial
intelligence, network intrusion detection systems based on machine learning (ML) have yet …
intelligence, network intrusion detection systems based on machine learning (ML) have yet …
Outside the closed world: On using machine learning for network intrusion detection
In network intrusion detection research, one popular strategy for finding attacks is monitoring
a network's activity for anomalies: deviations from profiles of normality previously learned …
a network's activity for anomalies: deviations from profiles of normality previously learned …