A survey on advanced persistent threats: Techniques, solutions, challenges, and research opportunities

A Alshamrani, S Myneni, A Chowdhary… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Threats that have been primarily targeting nation states and their associated entities have
expanded the target zone to include the private and corporate sectors. This class of threats …

Three decades of deception techniques in active cyber defense-retrospect and outlook

L Zhang, VLL Thing - Computers & Security, 2021 - Elsevier
Deception techniques have been widely seen as a game changer in cyber defense. In this
paper, we review representative techniques in honeypots, honeytokens, and moving target …

Outside the closed world: On using machine learning for network intrusion detection

R Sommer, V Paxson - 2010 IEEE symposium on security and …, 2010 - ieeexplore.ieee.org
In network intrusion detection research, one popular strategy for finding attacks is monitoring
a network's activity for anomalies: deviations from profiles of normality previously learned …

Bothunter: Detecting malware infection through ids-driven dialog correlation.

G Gu, PA Porras, V Yegneswaran, MW Fong… - USENIX Security …, 2007 - usenix.org
We present a new kind of network perimeter monitoring strategy, which focuses on
recognizing the infection and coordination dialog that occurs during a successful malware …

Systems, methods, and media for detecting network anomalies using a trained probabilistic model

Y Song, AD Keromytis, SJ Stolfo - US Patent 8,844,033, 2014 - Google Patents
Systems, methods, and media for detecting network anoma lies are provided. In some
embodiments, a training dataset of communication protocol messages having argument …

Method and system for detecting malicious and/or botnet-related domain names

R Perdisci, W Lee - US Patent 10,027,688, 2018 - Google Patents
(57) ABSTRACT A method and system of detecting a malicious and/or botnet-related
domain name, comprising: reviewing a domain name used in Domain Name System (DNS) …

Method and system for detecting and responding to attacking networks

D Dagon, N Feamster, W Lee, R Edmonds… - US Patent …, 2013 - Google Patents
4,843,540 A 6, 1989 Stolfo 4,860,201 A 8, 1989 Stolfo et al. 5,363,473 A 11/1994 Stolfo et al.
5,497.486 A 3, 1996 Stolfo et al. 5,563,783 A 10, 1996 Stolfo et al. 5,668,897 A 9, 1997 …

Stealthy malware detection through vmm-based" out-of-the-box" semantic view reconstruction

X Jiang, X Wang, D Xu - Proceedings of the 14th ACM conference on …, 2007 - dl.acm.org
An alarming trend in malware attacks is that they are armed with stealthy techniques to
detect, evade, and subvert malware detection facilities of the victim. On the defensive side, a …

Automatically patching errors in deployed software

JH Perkins, S Kim, S Larsen, S Amarasinghe… - Proceedings of the …, 2009 - dl.acm.org
We present ClearView, a system for automatically patching errors in deployed software.
ClearView works on stripped Windows x86 binaries without any need for source code …

[PDF][PDF] All your iframes point to us

NPP Mavrommatis, M Monrose - USENIX security symposium, 2008 - usenix.org
As the web continues to play an ever increasing role in information exchange, so too is it
becoming the prevailing platform for infecting vulnerable hosts. In this paper, we provide a …