Phishing environments, techniques, and countermeasures: A survey

A Aleroud, L Zhou - Computers & Security, 2017 - Elsevier
Phishing has become an increasing threat in online space, largely driven by the evolving
web, mobile, and social networking technologies. Previous phishing taxonomies have …

A survey on malicious domains detection through DNS data analysis

Y Zhauniarovich, I Khalil, T Yu, M Dacier - ACM Computing Surveys …, 2018 - dl.acm.org
Malicious domains are one of the major resources required for adversaries to run attacks
over the Internet. Due to the important role of the Domain Name System (DNS), extensive …

Malware traffic classification using principal component analysis and artificial neural network for extreme surveillance

D Arivudainambi, VK KA, P Visu - Computer Communications, 2019 - Elsevier
Code-driven systems have extent to more than half of the world's populations in ambient
data and connectivity, offering formerly unimagined opportunities and unexpected threats …

RTVD: A real-time volumetric detection scheme for DDoS in the Internet of Things

J Li, M Liu, Z Xue, X Fan, X He - IEEE Access, 2020 - ieeexplore.ieee.org
Distributed Denial of Service (DDoS) attacks are increasingly harmful to the cyberspace
nowadays. The attackers can now easily launch a bigger and more challenging DDoS attack …

Crimeware-as-a-service—a survey of commoditized crimeware in the underground market

AK Sood, RJ Enbody - International journal of critical infrastructure …, 2013 - Elsevier
Crimeware-as-a-service (CaaS) has become a prominent component of the underground
economy. CaaS provides a new dimension to cyber crime by making it more organized …

[HTML][HTML] A genomic rule-based KNN model for fast flux botnet detection

FE Ayo, JB Awotunde, SO Folorunso… - Egyptian Informatics …, 2023 - Elsevier
Abstract Fast Flux Botnet (FFB) is an advance method developed by cyber criminals to
perpetrate distributed malicious attacks. The major problems of existing FFB detection …

Early detection of malicious flux networks via large-scale passive DNS traffic analysis

R Perdisci, I Corona, G Giacinto - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
In this paper, we present FluxBuster, a novel passive DNS traffic analysis system for
detecting and tracking malicious flux networks. FluxBuster applies large-scale monitoring of …

Compromised or {Attacker-Owned}: A large scale classification and study of hosting domains of malicious {URLs}

R De Silva, M Nabeel, C Elvitigala, I Khalil… - 30th USENIX security …, 2021 - usenix.org
The mitigation action against a malicious website may differ greatly depending on how that
site is hosted. If it is hosted under a private apex domain, where all its subdomains and …

The next generation cognitive security operations center: network flow forensics using cybersecurity intelligence

K Demertzis, P Kikiras, N Tziritas, SL Sanchez… - Big data and cognitive …, 2018 - mdpi.com
A Security Operations Center (SOC) can be defined as an organized and highly skilled team
that uses advanced computer forensics tools to prevent, detect and respond to cybersecurity …

Malphase: Fine-grained malware detection using network flow data

M Piskozub, F De Gaspari, F Barr-Smith… - Proceedings of the …, 2021 - dl.acm.org
Economic incentives encourage malware authors to constantly develop new, increasingly
complex malware to steal sensitive data or blackmail individuals and companies into paying …