Adversarial machine learning attacks and defense methods in the cyber security domain

I Rosenberg, A Shabtai, Y Elovici… - ACM Computing Surveys …, 2021 - dl.acm.org
In recent years, machine learning algorithms, and more specifically deep learning
algorithms, have been widely used in many fields, including cyber security. However …

Phishing environments, techniques, and countermeasures: A survey

A Aleroud, L Zhou - Computers & Security, 2017 - Elsevier
Phishing has become an increasing threat in online space, largely driven by the evolving
web, mobile, and social networking technologies. Previous phishing taxonomies have …

A visualized botnet detection system based deep learning for the internet of things networks of smart cities

R Vinayakumar, M Alazab, S Srinivasan… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Internet of Things applications for smart cities have currently become a primary target for
advanced persistent threats of botnets. This article proposes a botnet detection system …

Malicious URL detection using machine learning: A survey

D Sahoo, C Liu, SCH Hoi - arxiv preprint arxiv:1701.07179, 2017 - arxiv.org
Malicious URL, aka malicious website, is a common and serious threat to cybersecurity.
Malicious URLs host unsolicited content (spam, phishing, drive-by exploits, etc.) and lure …

A comprehensive measurement study of domain generating malware

D Plohmann, K Yakdan, M Klatt, J Bader… - 25th USENIX Security …, 2016 - usenix.org
Recent years have seen extensive adoption of domain generation algorithms (DGA) by
modern botnets. The main goal is to generate a large number of domain names and then …

Predicting domain generation algorithms with long short-term memory networks

J Woodbridge, HS Anderson, A Ahuja… - arxiv preprint arxiv …, 2016 - arxiv.org
Various families of malware use domain generation algorithms (DGAs) to generate a large
number of pseudo-random domain names to connect to a command and control (C&C) …

From {Throw-Away} traffic to bots: Detecting the rise of {DGA-Based} malware

M Antonakakis, R Perdisci, Y Nadji… - 21st USENIX Security …, 2012 - usenix.org
Many botnet detection systems employ a blacklist of known command and control (C&C)
domains to detect bots and block their traffic. Similar to signature-based virus detection, such …

A LSTM based framework for handling multiclass imbalance in DGA botnet detection

D Tran, H Mac, V Tong, HA Tran, LG Nguyen - Neurocomputing, 2018 - Elsevier
In recent years, botnets have become a major threat on the Internet. Most sophisticated bots
use Domain Generation Algorithms (DGA) to pseudo-randomly generate a large number of …

Botnet in DDoS attacks: trends and challenges

N Hoque, DK Bhattacharyya… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Threats of distributed denial of service (DDoS) attacks have been increasing day-by-day due
to rapid development of computer networks and associated infrastructure, and millions of …

A survey on malicious domains detection through DNS data analysis

Y Zhauniarovich, I Khalil, T Yu, M Dacier - ACM Computing Surveys …, 2018 - dl.acm.org
Malicious domains are one of the major resources required for adversaries to run attacks
over the Internet. Due to the important role of the Domain Name System (DNS), extensive …