Classification and analysis of malicious code detection techniques based on the APT attack

K Lee, J Lee, K Yim - Applied Sciences, 2023 - mdpi.com
According to the Fire-eye's M-Trends Annual Threat Report 2022, there are many advanced
persistent threat (APT) attacks that are currently in use, and such continuous and specialized …

[PDF][PDF] A survey: Recent advances and future trends in honeypot research

ML Bringer, CA Chelmecki, H Fu**oki - International Journal of …, 2012 - mecs-press.org
This paper presents a survey on recent advances in honeypot research from a review of 80+
papers on honeypots and related topics mostly published after year 2005. This paper …

Three ethical challenges of applications of artificial intelligence in cybersecurity

M Taddeo - Minds and machines, 2019 - Springer
In 2017, the WannCry and NotPeya showed that attacks targeting the cyber component of
infrastructures (eg attacks on power plants), services (eg attacks to banks or hospitals …

Ethical principles for artificial intelligence in national defence

M Taddeo, D McNeish, A Blanchard… - The 2021 Yearbook of the …, 2022 - Springer
Defence agencies across the globe identify artificial intelligence (AI) as a key technology to
maintain an edge over adversaries. As a result, efforts to develop or acquire AI capabilities …

Challenges and pitfalls in malware research

M Botacin, F Ceschin, R Sun, D Oliveira, A Grégio - Computers & Security, 2021 - Elsevier
As the malware research field became more established over the last two decades, new
research questions arose, such as how to make malware research reproducible, how to …

A survey of machine learning methods and challenges for windows malware classification

E Raff, C Nicholas - arxiv preprint arxiv:2006.09271, 2020 - arxiv.org
Malware classification is a difficult problem, to which machine learning methods have been
applied for decades. Yet progress has often been slow, in part due to a number of unique …

Mcboost: Boosting scalability in malware collection and analysis using statistical classification of executables

R Perdisci, A Lanzi, W Lee - 2008 Annual Computer Security …, 2008 - ieeexplore.ieee.org
In this work, we propose Malware Collection Booster (McBoost), a fast statistical malware
detection tool that is intended to improve the scalability of existing malware collection and …

Studying malicious websites and the underground economy on the Chinese web

J Zhuge, T Holz, C Song, J Guo, X Han… - Managing information risk …, 2008 - Springer
Abstract The World Wide Web gains more and more popularity within China with more than
1.31 million websites on the Chinese Web in June 2007. Driven by the economic profits …

Set-up and deployment of a high-interaction honeypot: experiment and lessons learned

V Nicomette, M Kaâniche, E Alata, M Herrb - Journal in computer virology, 2011 - Springer
This paper presents the lessons learned from an empirical analysis of attackers behaviours
based on the deployment on the Internet of a high-interaction honeypot for more than 1 year …

[PDF][PDF] Anatomy of drive-by download attack

VL Le, I Welch, X Gao, P Komisarczuk - Proceedings of the Eleventh …, 2013 - kk.sains.ac.id
Drive-by download attacks where web browsers are subverted by malicious content
delivered by web servers have become a common attack vector in recent years. Several …