Phishing environments, techniques, and countermeasures: A survey
Phishing has become an increasing threat in online space, largely driven by the evolving
web, mobile, and social networking technologies. Previous phishing taxonomies have …
web, mobile, and social networking technologies. Previous phishing taxonomies have …
A survey on malicious domains detection through DNS data analysis
Malicious domains are one of the major resources required for adversaries to run attacks
over the Internet. Due to the important role of the Domain Name System (DNS), extensive …
over the Internet. Due to the important role of the Domain Name System (DNS), extensive …
Malware traffic classification using principal component analysis and artificial neural network for extreme surveillance
Code-driven systems have extent to more than half of the world's populations in ambient
data and connectivity, offering formerly unimagined opportunities and unexpected threats …
data and connectivity, offering formerly unimagined opportunities and unexpected threats …
RTVD: A real-time volumetric detection scheme for DDoS in the Internet of Things
Distributed Denial of Service (DDoS) attacks are increasingly harmful to the cyberspace
nowadays. The attackers can now easily launch a bigger and more challenging DDoS attack …
nowadays. The attackers can now easily launch a bigger and more challenging DDoS attack …
Crimeware-as-a-service—a survey of commoditized crimeware in the underground market
Crimeware-as-a-service (CaaS) has become a prominent component of the underground
economy. CaaS provides a new dimension to cyber crime by making it more organized …
economy. CaaS provides a new dimension to cyber crime by making it more organized …
[HTML][HTML] A genomic rule-based KNN model for fast flux botnet detection
Abstract Fast Flux Botnet (FFB) is an advance method developed by cyber criminals to
perpetrate distributed malicious attacks. The major problems of existing FFB detection …
perpetrate distributed malicious attacks. The major problems of existing FFB detection …
Early detection of malicious flux networks via large-scale passive DNS traffic analysis
In this paper, we present FluxBuster, a novel passive DNS traffic analysis system for
detecting and tracking malicious flux networks. FluxBuster applies large-scale monitoring of …
detecting and tracking malicious flux networks. FluxBuster applies large-scale monitoring of …
Compromised or {Attacker-Owned}: A large scale classification and study of hosting domains of malicious {URLs}
The mitigation action against a malicious website may differ greatly depending on how that
site is hosted. If it is hosted under a private apex domain, where all its subdomains and …
site is hosted. If it is hosted under a private apex domain, where all its subdomains and …
The next generation cognitive security operations center: network flow forensics using cybersecurity intelligence
A Security Operations Center (SOC) can be defined as an organized and highly skilled team
that uses advanced computer forensics tools to prevent, detect and respond to cybersecurity …
that uses advanced computer forensics tools to prevent, detect and respond to cybersecurity …
Malphase: Fine-grained malware detection using network flow data
Economic incentives encourage malware authors to constantly develop new, increasingly
complex malware to steal sensitive data or blackmail individuals and companies into paying …
complex malware to steal sensitive data or blackmail individuals and companies into paying …