Botnets: A survey

SSC Silva, RMP Silva, RCG Pinto, RM Salles - Computer Networks, 2013 - Elsevier
Botnets, which are networks formed by malware-compromised machines, have become a
serious threat to the Internet. Such networks have been created to conduct large-scale …

Botnet communication patterns

G Vormayr, T Zseby, J Fabini - IEEE Communications Surveys & …, 2017 - ieeexplore.ieee.org
Malicious botnets have become a common threat and pervade large parts of the Internet
today. Existing surveys and taxonomies focus on botnet topologies, command and control …

Holmes: real-time apt detection through correlation of suspicious information flows

SM Milajerdi, R Gjomemo, B Eshete… - … IEEE Symposium on …, 2019 - ieeexplore.ieee.org
In this paper, we present HOLMES, a system that implements a new approach to the
detection of Advanced and Persistent Threats (APTs). HOLMES is inspired by several case …

Cyber threats to industrial IoT: a survey on attacks and countermeasures

K Tsiknas, D Taketzis, K Demertzis, C Skianis - IoT, 2021 - mdpi.com
In today's Industrial Internet of Things (IIoT) environment, where different systems interact
with the physical world, the state proposed by the Industry 4.0 standards can lead to …

Tactical provenance analysis for endpoint detection and response systems

WU Hassan, A Bates, D Marino - 2020 IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Endpoint Detection and Response (EDR) tools provide visibility into sophisticated intrusions
by matching system events against known adversarial behaviors. However, current solutions …

Cryptolock (and drop it): stop** ransomware attacks on user data

N Scaife, H Carter, P Traynor… - 2016 IEEE 36th …, 2016 - ieeexplore.ieee.org
Ransomware is a growing threat that encrypts auser's files and holds the decryption key until
a ransom ispaid by the victim. This type of malware is responsible fortens of millions of …

An empirical comparison of botnet detection methods

S Garcia, M Grill, J Stiborek, A Zunino - computers & security, 2014 - Elsevier
The results of botnet detection methods are usually presented without any comparison.
Although it is generally accepted that more comparisons with third-party methods may help …

Fresco: Modular composable security services for software-defined networks

SW Shin, P Porras, V Yegneswara… - 20th annual network …, 2013 - koasas.kaist.ac.kr
OpenFlow is an open standard that has gained tremendous interest in the last few years
within the network community. It is an embodiment of the software-defined networking …

Insomnia: Towards concept-drift robustness in network intrusion detection

G Andresini, F Pendlebury, F Pierazzi… - Proceedings of the 14th …, 2021 - dl.acm.org
Despite decades of research in network traffic analysis and incredible advances in artificial
intelligence, network intrusion detection systems based on machine learning (ML) have yet …

Outside the closed world: On using machine learning for network intrusion detection

R Sommer, V Paxson - 2010 IEEE symposium on security and …, 2010 - ieeexplore.ieee.org
In network intrusion detection research, one popular strategy for finding attacks is monitoring
a network's activity for anomalies: deviations from profiles of normality previously learned …