Dark-TRACER: Early Detection Framework for Malware Activity Based on Anomalous Spatiotemporal Patterns

C Han, J Takeuchi, T Takahashi, D Inoue - IEEE Access, 2022 - ieeexplore.ieee.org
As cyberattacks become increasingly prevalent globally, there is a need to identify trends in
these cyberattacks and take suitable countermeasures quickly. The darknet, an unused IP …

Real-time detection of global cyberthreat based on darknet by estimating anomalous synchronization using graphical lasso

C Han, J Shimamura, T Takahashi… - … on Information and …, 2020 - search.ieice.org
With the rapid evolution and increase of cyberthreats in recent years, it is necessary to detect
and understand it promptly and precisely to reduce the impact of cyberthreats. A darknet …

Automated detection of malware activities using nonnegative matrix factorization

C Han, J Takeuchi, T Takahashi… - 2021 IEEE 20th …, 2021 - ieeexplore.ieee.org
Malware is increasingly diversified and sophisti-cated. It is essential to rapidly and
accurately detect malware activities when malware infection spreads. However, accurately …

Real-time detection of malware activities by analyzing darknet traffic using graphical lasso

C Han, J Shimamura, T Takahashi… - 2019 18th IEEE …, 2019 - ieeexplore.ieee.org
Recent malware evolutions have rendered cyberspace less secure, and we are currently
witnessing an increasing number of severe security incidents. To minimize the impact of …

Deep in the dark-deep learning-based malware traffic detection without expert knowledge

G Marín, P Casas… - 2019 IEEE Security and …, 2019 - ieeexplore.ieee.org
With the ever-growing occurrence of networking attacks, robust network security systems are
essential to prevent and mitigate their harming effects. In recent years, machine learning …

Port-piece embedding for darknet traffic features and clustering of scan attacks

S Ishikawa, S Ozawa, T Ban - … 2020, Bangkok, Thailand, November 23–27 …, 2020 - Springer
With the proliferation of Internet of Things (IoT), the damage brought by cyber-attacks
abusing the resources of malware-infected IoT devices is becoming more serious. Darknet …

A malware collection and analysis framework based on darknet traffic

J Song, JW Choi, SS Choi - … , ICONIP 2012, Doha, Qatar, November 12-15 …, 2012 - Springer
Since a darknet is a set of unused IP addresses (ie, no real hosts are operated with them),
we are unable to observe the network traffic on it generally. In many cases, however …

Practical correlation analysis between scan and malware profiles against zero-day attacks based on darknet monitoring

K Nakao, D Inoue, M Eto, K Yoshioka - IEICE TRANSACTIONS on …, 2009 - search.ieice.org
Considering rapid increase of recent highly organized and sophisticated malwares, practical
solutions for the countermeasures against malwares especially related to zero-day attacks …

A novel cyber security capability: Inferring internet-scale infections by correlating malware and probing activities

E Bou-Harb, M Debbabi, C Assi - Computer Networks, 2016 - Elsevier
This paper presents a new approach to infer worldwide malware-infected machines by
solely analyzing their generated probing activities. In contrary to other adopted methods, the …

Large-scale monitoring for cyber attacks by using cluster information on darknet traffic features

H Nishikaze, S Ozawa, J Kitazono, T Ban… - Procedia Computer …, 2015 - Elsevier
This paper presents a machine learning approach to large-scale monitoring for malicious
activities on Internet. In the proposed system, network packets sent from a subnet to a …