Analysis of a"/0" Stealth Scan from a Botnet

A Dainotti, A King, KC Claffy, F Papale… - Proceedings of the 2012 …, 2012 - dl.acm.org
Botnets are the most common vehicle of cyber-criminal activity. They are used for spamming,
phishing, denial of service attacks, brute-force cracking, stealing private information, and …

Threats from the dark: a review over dark web investigation research for cyber threat intelligence

R Basheer, B Alkhatib - Journal of Computer Networks and …, 2021 - Wiley Online Library
From proactive detection of cyberattacks to the identification of key actors, analyzing
contents of the Dark Web plays a significant role in deterring cybercrimes and understanding …

nicter: An incident analysis system toward binding network monitoring with malware analysis

D Inoue, M Eto, K Yoshioka, S Baba… - … Data Collection and …, 2008 - ieeexplore.ieee.org
We have been developing the Network Incident analysis Center for Tactical Emergency
Response (nicter), whose present focus is on detecting and identifying propagating …

Characterizing dark dns behavior

J Oberheide, M Karir, ZM Mao - Detection of Intrusions and Malware, and …, 2007 - Springer
Security researchers and network operators increasingly rely on information gathered from
honeypots and sensors deployed on darknets, or unused address space, for attack …

A multifaceted approach to understanding the botnet phenomenon

M Abu Rajab, J Zarfoss, F Monrose… - Proceedings of the 6th …, 2006 - dl.acm.org
The academic community has long acknowledged the existence of malicious botnets,
however to date, very little is known about the behavior of these distributed computing …

Systematic approach for detection and assessment of dark web threat evolution

P William, MA Jawale, AB Pawar… - … Intelligence for the …, 2022 - igi-global.com
Cyber thieves and terrorists use the dark web as one of the most difficult channels to achieve
their nefarious goals. There are many similarities between cyber-crimes and real-world …

Dark-net ecosystem cyber-threat intelligence (CTI) tool

N Arnold, M Ebrahimi, N Zhang… - … on Intelligence and …, 2019 - ieeexplore.ieee.org
The frequency and costs of cyber-attacks are increasing each year. By the end of 2019, the
total cost of data breaches is expected to reach $2.1 trillion through the ever-growing online …

Tracking ghostnet: Investigating a cyber espionage network

R Deibert, R Rohozinski, A Manchanda… - … : Investigating a cyber …, 2009 - ora.ox.ac.uk
Cyber espionage is an issue whose time has come. In this second report from the
Information Warfare Monitor, we lay out the findings of a 10-month investigation of alleged …

Threat intelligence generation using network telescope data for industrial control systems

O Cabana, AM Youssef, M Debbabi… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Industrial Control Systems (ICSs) are cyber-physical systems that offer attractive targets to
threat actors due to the scale of damages, both physical and cyber, that successful …

The dark web phenomenon: A review and research agenda

A Gupta, SB Maynard, A Ahmad - arXiv preprint arXiv:2104.07138, 2021 - arxiv.org
The internet can be broadly divided into three parts: surface, deep and dark. The dark web
has become notorious in the media for being a hidden part of the web where all manner of …