[HTML][HTML] The zombie roundup: Understanding, detecting, and disrupting botnets.

E Cooke, F Jahanian, D McPherson - SRUTI, 2005 - usenix.org
Global Internet threats are undergoing a profound transformation from attacks designed
solely to disable infrastructure to those that also target people and organizations. Behind …

A mysterious and darkside of the darknet: A qualitative study

A Anjum, DC Kaur, S Kondapalli, MA Hussain… - Webology, 2021 - papers.ssrn.com
Nowadays, the darknet or dark web has become one of the most booming topics in context
with cyber security. Several research studies and current reports conclude that how the …

Darknets

S Mansfield-Devine - Computer Fraud & Security, 2009 - Elsevier
Darknets - ScienceDirect Skip to main contentSkip to article Elsevier logo Journals & Books
Search RegisterSign in View PDF Download full issue Search ScienceDirect Elsevier …

Inferring and investigating IoT-generated scanning campaigns targeting a large network telescope

S Torabi, E Bou-Harb, C Assi… - … on Dependable and …, 2020 - ieeexplore.ieee.org
The analysis of recent large-scale cyber attacks, which leveraged insecure Internet of Things
(IoT) devices to perform malicious activities on the Internet, highlighted the rise of IoT …

Practical correlation analysis between scan and malware profiles against zero-day attacks based on darknet monitoring

K Nakao, D Inoue, M Eto, K Yoshioka - IEICE TRANSACTIONS on …, 2009 - search.ieice.org
Considering rapid increase of recent highly organized and sophisticated malwares, practical
solutions for the countermeasures against malwares especially related to zero-day attacks …

DAEDALUS-VIZ: novel real-time 3D visualization for darknet monitoring-based alert system

D Inoue, M Eto, K Suzuki, M Suzuki… - Proceedings of the ninth …, 2012 - dl.acm.org
A darknet is a set of unused IP addresses whose monitoring is an effective way of detecting
malicious activities on the Internet. We have developed an alert system called DAEDALUS …

Measuring botnets in the wild: Some new trends

W Chang, A Mohaisen, A Wang, S Chen - Proceedings of the 10th ACM …, 2015 - dl.acm.org
Today, botnets are still responsible for most large scale attacks on the Internet. Botnets are
versatile, they remain the most powerful attack platform by constantly and continuously …

[图书][B] Inside the dark web

E Ozkaya, R Islam - 2019 - taylorfrancis.com
Inside the Dark Web provides a broad overview of emerging digital threats and computer
crimes, with an emphasis on cyberstalking, hacktivism, fraud and identity theft, and attacks …

Darknet and deepnet mining for proactive cybersecurity threat intelligence

E Nunes, A Diab, A Gunn, E Marin… - … IEEE Conference on …, 2016 - ieeexplore.ieee.org
In this paper, we present an operational system for cyber threat intelligence gathering from
various social platforms on the Internet particularly sites on the darknet and deepnet. We …

Towards a conceptual typology of darknet risks

O Ogbanufe, J Wolfe, F Baucum - Journal of Computer Information …, 2023 - Taylor & Francis
Increased rewards and reduced risks drive illicit networks. Cybercriminals seek to avoid
risks, including detection, arrests, sanctions, and violence. Hence, they employ several …