Three decades of deception techniques in active cyber defense-retrospect and outlook

L Zhang, VLL Thing - Computers & Security, 2021 - Elsevier
Deception techniques have been widely seen as a game changer in cyber defense. In this
paper, we review representative techniques in honeypots, honeytokens, and moving target …

Survey on botnet detection techniques: Classification, methods, and evaluation

Y Xing, H Shu, H Zhao, D Li… - Mathematical Problems in …, 2021 - Wiley Online Library
With the continuous evolution of the Internet, as well as the development of the Internet of
Things, smart terminals, cloud platforms, and social platforms, botnets showing the …

[PDF][PDF] A survey on honeypot software and data analysis

M Nawrocki, M Wählisch, TC Schmidt, C Keil… - arXiv preprint arXiv …, 2016 - arxiv.org
A Survey on Honeypot Software and Data Analysis Page 1 A Survey on Honeypot Software and
Data Analysis Marcin Nawrocki ∗ , Matthias Wählisch ∗ , Thomas C. Schmidt † , Christian Keil ‡ …

Cyber reconnaissance techniques

W Mazurczyk, L Caviglione - Communications of the ACM, 2021 - dl.acm.org
Cyber reconnaissance techniques Page 1 86 COMMUNICATIONS OF THE ACM | MARCH 2021
| VOL. 64 | NO. 3 review articles IMA GE B Y DE S TROL O VE ALMOST EVERY DAY, security …

An SDN-enabled pseudo-honeypot strategy for distributed denial of service attacks in industrial Internet of Things

M Du, K Wang - IEEE Transactions on Industrial Informatics, 2019 - ieeexplore.ieee.org
Leveraging high-performance software-defined networks (SDNs) to manage industrial
Internet of Things (IIoT) devices has become a promising trend; the SDN is expected to be …

Survey and taxonomy of botnet research through life-cycle

RA Rodríguez-Gómez, G Maciá-Fernández… - ACM Computing …, 2013 - dl.acm.org
Of all current threats to cybersecurity, botnets are at the top of the list. In consequence,
interest in this problem is increasing rapidly among the research community and the number …

[图书][B] Some models in the theory of computer viruses propagation

A Iliev, N Kyurkchiev, A Rahnev, T Terzieva - 2019 - researchgate.net
3.1 Introduction 35 3.2 Approximating cumulative number of Netsky worm variants 37 3.3
Approximating number of malicious hosts 39 3.4 Approximating cdf of content signatures for …

A survey on botnets: Incentives, evolution, detection and current trends

SN Thanh Vu, M Stege, PI El-Habr, J Bang, N Dragoni - Future Internet, 2021 - mdpi.com
Botnets, groups of malware-infected hosts controlled by malicious actors, have gained
prominence in an era of pervasive computing and the Internet of Things. Botnets have …

Chatbots in a honeypot world

F McKee, D Noever - arXiv preprint arXiv:2301.03771, 2023 - arxiv.org
Question-and-answer agents like ChatGPT offer a novel tool for use as a potential honeypot
interface in cyber security. By imitating Linux, Mac, and Windows terminal commands and …

Uncovering APT malware traffic using deep learning combined with time sequence and association analysis

W Niu, J Zhou, Y Zhao, X Zhang, Y Peng, C Huang - Computers & Security, 2022 - Elsevier
Traditional malware detection methods based on static traffic characteristics and machine
learning are hard to cope with the increasing number of APT malware variants. In order to …