Automated dataset generation system for collaborative research of cyber threat analysis

D Kim, HK Kim - Security and communication networks, 2019 - Wiley Online Library
The objectives of cyberattacks are becoming sophisticated, and attackers are concealing
their identity by masquerading as other attackers. Cyber threat intelligence (CTI) is gaining …

Darknet traffic analysis and classification using numerical AGM and mean shift clustering algorithm

R Niranjana, VA Kumar, S Sheen - SN Computer Science, 2020 - Springer
The cyberspace continues to evolve more complex than ever anticipated, and same is the
case with security dynamics there. As our dependence on cyberspace is increasing day-by …

Dark-TRACER: Early Detection Framework for Malware Activity Based on Anomalous Spatiotemporal Patterns

C Han, J Takeuchi, T Takahashi, D Inoue - IEEE Access, 2022 - ieeexplore.ieee.org
As cyberattacks become increasingly prevalent globally, there is a need to identify trends in
these cyberattacks and take suitable countermeasures quickly. The darknet, an unused IP …

Crime data mining, threat analysis and prediction

M Farsi, A Daneshkhah, AH Far, O Chatrabgoun… - Cyber …, 2018 - Springer
Cybercriminology as a subject area has numerous dimensions. Some studies in the field
primarily focus on a corrective action to reduce the impact of an already committed crime …

Cyber threat investigation of SCADA modbus activities

C Fachkha - 2019 10th IFIP international conference on new …, 2019 - ieeexplore.ieee.org
The use of inter-connectivity of Supervisory Control and Data Acquisition (SCADA) and
Industrial Control Systems (ICS) networks in smart technologies have exposed them to a …

Topological analysis and visualisation of network monitoring data: Darknet case study

M Coudriau, A Lahmadi… - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
Network monitoring is a primordial source of data in cyber-security since it may reveal
abnormal behaviors of users or applications. Indeed, security analysts and tools like IDS …

Detecting the impact of software vulnerability on attacks: A case study of network telescope scans

A Houmz, G Mezzour, K Zkik, M Ghogho… - Journal of Network and …, 2021 - Elsevier
Network scanning is one of the first steps in gathering information about a target before
launching attacks. It is used to scan for vulnerable devices and exposed services in order to …

DKaaS: DARK-KERNEL as a service for active cyber threat intelligence

PVS Charan, G Ratnakaram, H Chunduri… - Computers & …, 2023 - Elsevier
Abstract Cyber Threat Intelligence (CTI) plays an indispensable role in providing evidence-
based knowledge to plan defensive strategies against advanced cyber attacks. Most threat …

Assessing internet-wide cyber situational awareness of critical sectors

M Husák, N Neshenko, MS Pour, E Bou-Harb… - Proceedings of the 13th …, 2018 - dl.acm.org
In this short paper, we take a first step towards empirically assessing Internet-wide malicious
activities generated from and targeted towards Internet-scale business sectors (ie, financial …

Countermeasures against worm spreading: A new challenge for vehicular networks

A Boukerche, Q Zhang - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Vehicular ad hoc networks (VANETs) are essential components of the intelligent transport
systems. They are attracting an increasing amount of interest in research and industrial …