Darknet as a source of cyber intelligence: Survey, taxonomy, and characterization

C Fachkha, M Debbabi - IEEE Communications Surveys & …, 2015 - ieeexplore.ieee.org
Today, the Internet security community largely emphasizes cyberspace monitoring for the
purpose of generating cyber intelligence. In this paper, we present a survey on darknet. The …

Automatic analysis of malware behavior using machine learning

K Rieck, P Trinius, C Willems… - Journal of computer …, 2011 - content.iospress.com
Malicious software–so called malware–poses a major threat to the security of computer
systems. The amount and diversity of its variants render classic security defenses ineffective …

[PDF][PDF] A survey on honeypot software and data analysis

M Nawrocki, M Wählisch, TC Schmidt, C Keil… - arxiv preprint arxiv …, 2016 - arxiv.org
A Survey on Honeypot Software and Data Analysis Page 1 A Survey on Honeypot Software and
Data Analysis Marcin Nawrocki ∗ , Matthias Wählisch ∗ , Thomas C. Schmidt † , Christian Keil ‡ …

Learning and classification of malware behavior

K Rieck, T Holz, C Willems, P Düssel… - … Conference on Detection …, 2008 - Springer
Malicious software in form of Internet worms, computer viruses, and Trojan horses poses a
major threat to the security of networked systems. The diversity and amount of its variants …

[PDF][PDF] Models and measures for correlation in cyber-insurance.

R Böhme, G Kataria - Weis, 2006 - core.ac.uk
High correlation in failure of information systems due to worms and viruses has been cited
as major impediment to cyber-insurance. However, of the many cyber-risk classes that …

Scriptgen: an automated script generation tool for honeyd

C Leita, K Mermoud, M Dacier - 21st Annual Computer Security …, 2005 - ieeexplore.ieee.org
Honeyd (N. Provos, 2004) is a popular tool developed by Niels Provos that offers a simple
way to emulate services offered by several machines on a single PC. It is a so called low …

[PDF][PDF] Feature selection and extraction for malware classification.

CT Lin, NJ Wang, H **ao, C Eckert - J. Inf. Sci. Eng., 2015 - researchgate.net
The explosive amount of malware continues their threats in network and operating systems.
Signature-based method is widely used for detecting malware. Unfortunately, it is unable to …

Lessons learned from the deployment of a high-interaction honeypot

E Alata, V Nicomette, M Kaâniche… - 2006 Sixth European …, 2006 - ieeexplore.ieee.org
This paper presents an experimental study and the lessons learned from the observation of
the attackers when logged on a compromised machine. The results are based on a six …

Cloud watching: Understanding attacks against cloud-hosted services

L Izhikevich, M Tran, M Kallitsis, A Fass… - Proceedings of the 2023 …, 2023 - dl.acm.org
Cloud computing has dramatically changed service deployment patterns. In this work, we
analyze how attackers identify and target cloud services in contrast to traditional enterprise …

Profiling attacker behavior following SSH compromises

D Ramsbrock, R Berthier… - 37th Annual IEEE/IFIP …, 2007 - ieeexplore.ieee.org
This practical experience report presents the results of an experiment aimed at building a
profile of attacker behavior following a remote compromise. For this experiment, we utilized …