Continuous and multiregional monitoring of malicious hosts

S Fujii, T Sato, S Aoki, Y Tsuda, Y Okano… - Proceedings of the …, 2020 - dl.acm.org
The number of cybersecurity threats has been increasing, and these threats have become
more sophisticated year after year. Malicious hosts play a large role in modern cyberattacks …

Ostinato: Cross-host Attack Correlation Through Attack Activity Similarity Detection

SK Ghosh, K Satvat, R Gjomemo… - … on Information Systems …, 2022 - Springer
Modern attacks against enterprises often have multiple targets inside the enterprise network.
Due to the large size of these networks and increasingly stealthy attacks, attacker activities …

[PDF][PDF] Early detection and mitigation of multi-stage network attacks

M Husák - 2015 - is.muni.cz
The number of cybernetic threats is rising with new vulnerabilities and forms of attacks being
discovered on a daily basis. Security is not a state, but a process, which means that we need …

Assessing internet-wide cyber situational awareness of critical sectors

M Husák, N Neshenko, MS Pour, E Bou-Harb… - Proceedings of the 13th …, 2018 - dl.acm.org
In this short paper, we take a first step towards empirically assessing Internet-wide malicious
activities generated from and targeted towards Internet-scale business sectors (ie, financial …

[PDF][PDF] Wombat: towards a worldwide observatory of Malicious behaviors and attack threats

F Pouget - 2006 - pdfs.semanticscholar.org
WOMBAT: towards a Worldwide Observatory of Malicious Behaviors and Attack Threats Page
1 TF-CSIRT 2006 WOMBAT: towards a Worldwide Observatory of Malicious Behaviors and …

Anti-Reconnaissance: Long Short-Term Memory Based Detection, Classification and Mitigation of Hostile Network Exploration

D Fraunholz, D Reti, SD Antón… - ECCWS 2018 17th …, 2018 - books.google.com
Computer networks provide an excellent environment for stealth reconnaissance activities.
Modern computer systems are predominantly connected to a network. Recent events like …

ACTracker: A fast and efficient attack investigation method based on event causality

E Hu, A Fu, Z Zhang, L Zhang, Y Guo… - IEEE INFOCOM 2021 …, 2021 - ieeexplore.ieee.org
The emerging advanced persistent threats (APT) have become a significant threat to
enterprise network security. Carrying out the attack's causality analysis can help the cyber …

SteinerLog: Prize collecting the audit logs for threat hunting on enterprise network

B Bhattarai, H Huang - Proceedings of the 2022 ACM on Asia …, 2022 - dl.acm.org
Advanced cyberattacks are carried out in multiple stages, where each stage performs a
specific task corresponding to the campaign. While these steps are designed to blend in with …

[PDF][PDF] Resilient and Self-Organizing Overlay of Collaborative Security Monitors

J Li, V Lo, X Kang, D Zhou, D Rao - 2004 - Citeseer
As attacks toward the Internet become more sophisticated, destructive and widespread,
especially those distributed attacks that exploit multiple launching sites, security systems that …

PatchSweetner: Exploit Detection Through the Automatic Transformation of Security Patches

A Larmuseau, D Shila - MILCOM 2018-2018 IEEE Military …, 2018 - ieeexplore.ieee.org
When security flaws are discovered in software systems, vendors and/or developers resolve
them by releasing patches that fix those security flaws. However, releasing these patches …