M Schäfer, M Fuchs, M Strohmeier… - … on Cyber Conflict …, 2019 - ieeexplore.ieee.org
The Dark Web, a conglomerate of services hidden from search engines and regular users, is used by cyber criminals to offer all kinds of illegal services and goods. Multiple Dark Web …
M Mirea, V Wang, J Jung - Security Journal, 2019 - Springer
In recent years, the Darknet has become one of the most discussed topics in cyber security circles. Current academic studies and media reports tend to highlight how the anonymous …
Dark Web is one of the most challenging and untraceable mediums adopted by the cyber criminals, terrorists, and state-sponsored spies to fulfil their illicit motives. Cyber-crimes …
Z Li, A Goyal, Y Chen - Botnet detection: Countering the largest security …, 2008 - Springer
In this book chapter, we demonstrated that the botnet scan traffic can be very useful in terms of inferring the general properties of the botnets. We developed a general paradigm for …
P Richter, A Berger - Proceedings of the Internet Measurement …, 2019 - dl.acm.org
Scanning of hosts on the Internet to identify vulnerable devices and services is a key component in many of today's cyberattacks. Tracking this scanning activity, in turn, provides …
This work proposes a novel approach to infer and characterize Internet-scale DNS Distributed Reflection Denial of Service (DRDoS) attacks by leveraging the darknet space …
N Rust-Nguyen, S Sharma, M Stamp - Computers & Security, 2023 - Elsevier
The anonymous nature of darknets is commonly exploited for illegal activities. Previous research has employed machine learning and deep learning techniques to automate the …
Z Li, A Goyal, Y Chen, V Paxson - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
Botnets dominate today's attack landscape. In this work, we investigate ways to analyze collections of malicious probing traffic in order to understand the significance of large-scale …
Effective network security administration depends to a great extent on having accurate, concise, high-quality information about malicious activity in one's network. Honeynets can …