Detecting and preventing cyber insider threats: A survey
Information communications technology systems are facing an increasing number of cyber
security threats, the majority of which are originated by insiders. As insiders reside behind …
security threats, the majority of which are originated by insiders. As insiders reside behind …
Prudent practices for designing malware experiments: Status quo and outlook
Malware researchers rely on the observation of malicious code in execution to collect
datasets for a wide array of experiments, including generation of detection models, study of …
datasets for a wide array of experiments, including generation of detection models, study of …
A mobile malware detection method using behavior features in network traffic
Android has become the most popular mobile platform due to its openness and flexibility.
Meanwhile, it has also become the main target of massive mobile malware. This …
Meanwhile, it has also become the main target of massive mobile malware. This …
Malware analysis by combining multiple detectors and observation windows
M Ficco - IEEE Transactions on Computers, 2021 - ieeexplore.ieee.org
Malware developers continually attempt to modify the execution pattern of malicious code
hiding it inside apparent normal applications, which makes its detection and classification …
hiding it inside apparent normal applications, which makes its detection and classification …
Unknown malware detection using network traffic classification
We present an end-to-end supervised based system for detecting malware by analyzing
network traffic. The proposed method extracts 972 behavioral features across different …
network traffic. The proposed method extracts 972 behavioral features across different …
Paint it black: Evaluating the effectiveness of malware blacklists
Blacklists are commonly used to protect computer systems against the tremendous number
of malware threats. These lists include abusive hosts such as malware sites or botnet …
of malware threats. These lists include abusive hosts such as malware sites or botnet …
Manufacturing compromise: the emergence of exploit-as-a-service
We investigate the emergence of the exploit-as-a-service model for driveby browser
compromise. In this regime, attackers pay for an exploit kit or service to do the" dirty work" of …
compromise. In this regime, attackers pay for an exploit kit or service to do the" dirty work" of …
Does every second count? time-based evolution of malware behavior in sandboxes
The amount of time in which a sample is executed is one of the key parameters of a malware
analysis sandbox. Setting the threshold too high hinders the scalability and reduces the …
analysis sandbox. Setting the threshold too high hinders the scalability and reduces the …
Sok: P2pwned-modeling and evaluating the resilience of peer-to-peer botnets
Centralized botnets are easy targets for takedown efforts by computer security researchers
and law enforcement. Thus, botnet controllers have sought new ways to harden the …
and law enforcement. Thus, botnet controllers have sought new ways to harden the …
Going wild: Large-scale classification of open DNS resolvers
Since several years, millions of recursive DNS resolvers are-deliberately or not-open to the
public. This, however, is counter-intuitive, since the operation of such openly accessible …
public. This, however, is counter-intuitive, since the operation of such openly accessible …