Detecting and preventing cyber insider threats: A survey

L Liu, O De Vel, QL Han, J Zhang… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Information communications technology systems are facing an increasing number of cyber
security threats, the majority of which are originated by insiders. As insiders reside behind …

Prudent practices for designing malware experiments: Status quo and outlook

C Rossow, CJ Dietrich, C Grier… - … IEEE symposium on …, 2012 - ieeexplore.ieee.org
Malware researchers rely on the observation of malicious code in execution to collect
datasets for a wide array of experiments, including generation of detection models, study of …

A mobile malware detection method using behavior features in network traffic

S Wang, Z Chen, Q Yan, B Yang, L Peng… - Journal of Network and …, 2019 - Elsevier
Android has become the most popular mobile platform due to its openness and flexibility.
Meanwhile, it has also become the main target of massive mobile malware. This …

Malware analysis by combining multiple detectors and observation windows

M Ficco - IEEE Transactions on Computers, 2021 - ieeexplore.ieee.org
Malware developers continually attempt to modify the execution pattern of malicious code
hiding it inside apparent normal applications, which makes its detection and classification …

Unknown malware detection using network traffic classification

D Bekerman, B Shapira, L Rokach… - 2015 IEEE Conference …, 2015 - ieeexplore.ieee.org
We present an end-to-end supervised based system for detecting malware by analyzing
network traffic. The proposed method extracts 972 behavioral features across different …

Paint it black: Evaluating the effectiveness of malware blacklists

M Kührer, C Rossow, T Holz - … in Attacks, Intrusions and Defenses: 17th …, 2014 - Springer
Blacklists are commonly used to protect computer systems against the tremendous number
of malware threats. These lists include abusive hosts such as malware sites or botnet …

Manufacturing compromise: the emergence of exploit-as-a-service

C Grier, L Ballard, J Caballero, N Chachra… - Proceedings of the …, 2012 - dl.acm.org
We investigate the emergence of the exploit-as-a-service model for driveby browser
compromise. In this regime, attackers pay for an exploit kit or service to do the" dirty work" of …

Does every second count? time-based evolution of malware behavior in sandboxes

A Küchler, A Mantovani, Y Han, L Bilge… - NDSS 2021, Network …, 2021 - hal.science
The amount of time in which a sample is executed is one of the key parameters of a malware
analysis sandbox. Setting the threshold too high hinders the scalability and reduces the …

Sok: P2pwned-modeling and evaluating the resilience of peer-to-peer botnets

C Rossow, D Andriesse, T Werner… - … IEEE symposium on …, 2013 - ieeexplore.ieee.org
Centralized botnets are easy targets for takedown efforts by computer security researchers
and law enforcement. Thus, botnet controllers have sought new ways to harden the …

Going wild: Large-scale classification of open DNS resolvers

M Kührer, T Hupperich, J Bushart, C Rossow… - Proceedings of the 2015 …, 2015 - dl.acm.org
Since several years, millions of recursive DNS resolvers are-deliberately or not-open to the
public. This, however, is counter-intuitive, since the operation of such openly accessible …