APT beaconing detection: A systematic review

MA Talib, Q Nasir, AB Nassif, T Mokhamed… - Computers & …, 2022‏ - Elsevier
Abstract Advanced Persistent Threat (APT) is a type of threat that has grabbed the attention
of researchers, particularly in the industrial security field. APTs are cyber intrusions carried …

Sok: The mitre att&ck framework in research and practice

S Roy, E Panaousis, C Noakes, A Laszka… - arxiv preprint arxiv …, 2023‏ - arxiv.org
The MITRE ATT&CK framework, a comprehensive knowledge base of adversary tactics and
techniques, has been widely adopted by the cybersecurity industry as well as by academic …

DNS tunnelling, exfiltration and detection over cloud environments

L Salat, M Davis, N Khan - Sensors, 2023‏ - mdpi.com
The domain name system (DNS) protocol is fundamental to the operation of the internet,
however, in recent years various methodologies have been developed that enable DNS …

Real-time APT detection technologies: A literature review

S Mönch, H Roth - … on Cyber Security and Resilience (CSR), 2023‏ - ieeexplore.ieee.org
Recently, the usage of advanced persistent threats (APT) increased rapidly in the context of
cyberwar. To perform countermeasures against such attacks, an efficient APT detection is …

Leveraging machine learning for ransomware detection

N Rani, SV Dhavale - arxiv preprint arxiv:2206.01919, 2022‏ - arxiv.org
The current pandemic situation has increased cyber-attacks drastically worldwide. The
attackers are using malware like trojans, spyware, rootkits, worms, ransomware heavily …

Cyber threat hunting using unsupervised federated learning and adversary emulation

S Sheikhi, P Kostakos - … on Cyber Security and Resilience (CSR …, 2023‏ - ieeexplore.ieee.org
The rapid growth of communication networks, coupled with the increasing complexity of
cyber threats, necessitates the implementation of proactive measures to protect networks …

An Effective Threat Detection Framework for Advanced Persistent Cyberattacks.

SE Jeon, SJ Lee, EY Lee, YJ Lee… - Computers …, 2023‏ - search.ebscohost.com
Recently, with the normalization of non-face-to-face online environments in response to the
COVID-19 pandemic, the possibility of cyberattacks through endpoints has increased …

[HTML][HTML] Enhancing Anomaly Detection Through Latent Space Manipulation in Autoencoders: A Comparative Analysis

T Walczyna, D Jankowski, Z Piotrowski - Applied Sciences, 2024‏ - mdpi.com
This article explores the practical implementation of autoencoders for anomaly detection,
emphasizing their latent space manipulation and applicability across various domains. This …

Exploration of Open Source SIEM Tools and Deployment of an Appropriate Wazuh-Based Solution for Strengthening Cyberdefense

R Amami, M Charfeddine… - 2024 10th International …, 2024‏ - ieeexplore.ieee.org
In an ever-evolving digital landscape, the significance of robust cybersecurity measures
continues to grow. This paper explores the efficacy of fortifying organizational defenses …

[PDF][PDF] Security Operation Center Methodology for 5G Networks

M Orsós, R Török, C Faragó, B Antalfia… - Acta Polytechnica …, 2025‏ - acta.uni-obuda.hu
The utilization of the recently introduced yet rapidly proliferating new generation of 5G
mobile communications offers many new advantages. However, it has also brought with it …