Adversarial machine learning attacks and defense methods in the cyber security domain
In recent years, machine learning algorithms, and more specifically deep learning
algorithms, have been widely used in many fields, including cyber security. However …
algorithms, have been widely used in many fields, including cyber security. However …
Phishing environments, techniques, and countermeasures: A survey
Phishing has become an increasing threat in online space, largely driven by the evolving
web, mobile, and social networking technologies. Previous phishing taxonomies have …
web, mobile, and social networking technologies. Previous phishing taxonomies have …
A visualized botnet detection system based deep learning for the internet of things networks of smart cities
R Vinayakumar, M Alazab, S Srinivasan… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Internet of Things applications for smart cities have currently become a primary target for
advanced persistent threats of botnets. This article proposes a botnet detection system …
advanced persistent threats of botnets. This article proposes a botnet detection system …
Malicious URL detection using machine learning: A survey
Malicious URL, aka malicious website, is a common and serious threat to cybersecurity.
Malicious URLs host unsolicited content (spam, phishing, drive-by exploits, etc.) and lure …
Malicious URLs host unsolicited content (spam, phishing, drive-by exploits, etc.) and lure …
A comprehensive measurement study of domain generating malware
Recent years have seen extensive adoption of domain generation algorithms (DGA) by
modern botnets. The main goal is to generate a large number of domain names and then …
modern botnets. The main goal is to generate a large number of domain names and then …
Predicting domain generation algorithms with long short-term memory networks
Various families of malware use domain generation algorithms (DGAs) to generate a large
number of pseudo-random domain names to connect to a command and control (C&C) …
number of pseudo-random domain names to connect to a command and control (C&C) …
From {Throw-Away} traffic to bots: Detecting the rise of {DGA-Based} malware
Many botnet detection systems employ a blacklist of known command and control (C&C)
domains to detect bots and block their traffic. Similar to signature-based virus detection, such …
domains to detect bots and block their traffic. Similar to signature-based virus detection, such …
A LSTM based framework for handling multiclass imbalance in DGA botnet detection
In recent years, botnets have become a major threat on the Internet. Most sophisticated bots
use Domain Generation Algorithms (DGA) to pseudo-randomly generate a large number of …
use Domain Generation Algorithms (DGA) to pseudo-randomly generate a large number of …
Botnet in DDoS attacks: trends and challenges
Threats of distributed denial of service (DDoS) attacks have been increasing day-by-day due
to rapid development of computer networks and associated infrastructure, and millions of …
to rapid development of computer networks and associated infrastructure, and millions of …
A survey on malicious domains detection through DNS data analysis
Malicious domains are one of the major resources required for adversaries to run attacks
over the Internet. Due to the important role of the Domain Name System (DNS), extensive …
over the Internet. Due to the important role of the Domain Name System (DNS), extensive …