Technical aspects of cyber kill chain
Recent trends in targeted cyber-attacks has increased the interest of research in the field of
cyber security. Such attacks have massive disruptive effects on organizations, enterprises …
cyber security. Such attacks have massive disruptive effects on organizations, enterprises …
Deciphering malware's use of TLS (without decryption)
The use of TLS by malware poses new challenges to network threat detection because
traditional pattern-matching techniques can no longer be applied to its messages. However …
traditional pattern-matching techniques can no longer be applied to its messages. However …
Paint it black: Evaluating the effectiveness of malware blacklists
Blacklists are commonly used to protect computer systems against the tremendous number
of malware threats. These lists include abusive hosts such as malware sites or botnet …
of malware threats. These lists include abusive hosts such as malware sites or botnet …
PsyBoG: A scalable botnet detection method for large-scale DNS traffic
Abstract Domain Name System (DNS) traffic has become a rich source of information from a
security perspective. However, the volume of DNS traffic has been skyrocketing, such that …
security perspective. However, the volume of DNS traffic has been skyrocketing, such that …
[LIBRO][B] Information security management systems: a novel framework and software as a tool for compliance with information security standard
H Susanto, MN Almunawar - 2018 - taylorfrancis.com
This new volume, Information Security Management Systems: A Novel Framework and
Software as a Tool for Compliance with Information Security Standard, looks at information …
Software as a Tool for Compliance with Information Security Standard, looks at information …
Network malware classification comparison using DPI and flow packet headers
In order to counter cyber-attacks and digital threats, security experts must generate, share,
and exploit cyber-threat intelligence generated from malware. In this research, we address …
and exploit cyber-threat intelligence generated from malware. In this research, we address …
Traffic fingerprinting attacks on internet of things using machine learning
The Internet of Things (IoT) concept has been widely adopted and Internet connected
devices enter more and more areas of our everyday lives. However, their limited security …
devices enter more and more areas of our everyday lives. However, their limited security …
Combating the evasion mechanisms of social bots
The detection and anti-detection of social botnets constitute an arms race that enables social
botnets to evolve quickly. Existing host-side detection approaches cannot easily detect every …
botnets to evolve quickly. Existing host-side detection approaches cannot easily detect every …
ProVeX: Detecting Botnets with Encrypted Command and Control Channels
Abstract. Botmasters increasingly encrypt command-and-control (C&C) communication to
evade existing intrusion detection systems. Our detailed C&C traffic analysis shows that at …
evade existing intrusion detection systems. Our detailed C&C traffic analysis shows that at …
Network intrusion detection in encrypted traffic
Traditional signature-based intrusion detection systems inspect packet headers and
payloads to report any malicious or abnormal traffic behavior that is observed in the network …
payloads to report any malicious or abnormal traffic behavior that is observed in the network …