Abuse of cloud-based and public legitimate services as command-and-control (C&C) infrastructure: a systematic literature review

T Al lelah, G Theodorakopoulos, P Reinecke… - … of Cybersecurity and …, 2023 - mdpi.com
The widespread adoption of cloud-based and public legitimate services (CPLS) has
inadvertently opened up new avenues for cyber attackers to establish covert and resilient …

Tweet-based bot detection using big data analytics

A Derhab, R Alawwad, K Dehwah, N Tariq… - IEEE …, 2021 - ieeexplore.ieee.org
Twitter is one of the most popular micro-blogging social media platforms that has millions of
users. Due to its popularity, Twitter has been targeted by different attacks such as spreading …

Combating the evasion mechanisms of social bots

Y Ji, Y He, X Jiang, J Cao, Q Li - computers & security, 2016 - Elsevier
The detection and anti-detection of social botnets constitute an arms race that enables social
botnets to evolve quickly. Existing host-side detection approaches cannot easily detect every …

Securing malware cognitive systems against adversarial attacks

Y Ji, B Bowman, HH Huang - 2019 IEEE international …, 2019 - ieeexplore.ieee.org
The cognitive systems along with the machine learning techniques have provided significant
improvements for many applications. However, recent adversarial attacks, such as data …

Peek: A Prune-Centric Approach for K Shortest Path Computation

W Feng, S Chen, H Liu, Y Ji - … of the International Conference for High …, 2023 - dl.acm.org
The K shortest path (KSP) algorithm, which finds the top K shortest simple paths from a
source to a target vertex, has a wide range of real-world applications, eg, routing …

Machine learning detection of cloud services abuse as C&C Infrastructure

T Al lelah, G Theodorakopoulos, A Javed… - Journal of Cybersecurity …, 2023 - mdpi.com
The proliferation of cloud and public legitimate services (CLS) on a global scale has resulted
in increasingly sophisticated malware attacks that abuse these services as command-and …

Detecting the abuse of cloud services for C&C infrastructure through dynamic analysis and machine learning

T Al Lelah, G Theodorakopoulos… - 2024 International …, 2024 - ieeexplore.ieee.org
Cybercriminals increasingly abuse cloud and legitimate services (CLS) as covert command
and control (C&C) infrastructure to orchestrate malicious operations and evade detection …

Custompro: Network protocol customization through cross-host feature analysis

Y Chen, T Lan, G Venkataramani - … 2019, Orlando, FL, USA, October 23 …, 2019 - Springer
The implementations of network protocols are often “bloated” due to various users' needs
and complex environment for deployment. The continual expansion of program features …

Efficient defense against covert and side channel attack on multi-core processor using signal processing techniques

H Fang - 2021 - search.proquest.com
Modern application workloads are mostly deployed on cloud computing platforms. Illicit
communication across user domains is prohibited by Operating System (OS) or Virtual …

Understanding and detecting social botnet

Y Ji, Q Li - Botnets, 2019 - taylorfrancis.com
Social botnets have several inherent advantages that enable them to evade common botnet
detection approaches. When a social bot is in a malware-analysis environment, it may not …