Taxonomy and survey of collaborative intrusion detection

E Vasilomanolakis, S Karuppayah… - ACM computing …, 2015 - dl.acm.org
The dependency of our society on networked computers has become frightening: In the
economy, all-digital networks have turned from facilitators to drivers; as cyber-physical …

Assessing and augmenting SCADA cyber security: A survey of techniques

S Nazir, S Patel, D Patel - Computers & Security, 2017 - Elsevier
SCADA systems monitor and control critical infrastructures of national importance such as
power generation and distribution, water supply, transportation networks, and manufacturing …

[PDF][PDF] 僵尸网络研究

诸葛建伟, 韩心慧, 周勇林, 叶志远, 邹维 - 2008 - jos.org.cn
僵尸网络是一种从传统恶意代码形态进化而来的新型攻击方式, 为攻击者提供了隐匿,
灵活且高效的一对多命令与控制机制, 可以控制大量僵尸主机实现信息窃取 …

Automatic analysis of malware behavior using machine learning

K Rieck, P Trinius, C Willems… - Journal of computer …, 2011 - content.iospress.com
Malicious software–so called malware–poses a major threat to the security of computer
systems. The amount and diversity of its variants render classic security defenses ineffective …

[PDF][PDF] Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection

G Gu, R Perdisci, J Zhang, W Lee - 2008 - usenix.org
Botnets are now the key platform for many Internet attacks, such as spam, distributed denial-
of-service (DDoS), identity theft, and phishing. Most of the current botnet detection …

[PDF][PDF] Scalable, behavior-based malware clustering.

U Bayer, PM Comparetti, C Hlauschek, C Kruegel… - NDSS, 2009 - eurecom.eu
Anti-malware companies receive thousands of malware samples every day. To process this
large quantity, a number of automated analysis tools were developed. These tools execute a …

BotSniffer: Detecting botnet command and control channels in network traffic

G Gu, J Zhang, W Lee - 2008 - corescholar.libraries.wright.edu
Botnets are now recognized as one of the most serious security threats. In contrast to
previous malware, botnets have the characteristic of a command and control (C&C) channel …

Learning and classification of malware behavior

K Rieck, T Holz, C Willems, P Düssel… - … Conference on Detection …, 2008 - Springer
Malicious software in form of Internet worms, computer viruses, and Trojan horses poses a
major threat to the security of networked systems. The diversity and amount of its variants …

Toward automated dynamic malware analysis using cwsandbox

C Willems, T Holz, F Freiling - IEEE Security & Privacy, 2007 - ieeexplore.ieee.org
Malware is notoriously difficult to combat because it appears and spreads so quickly. In this
article, we describe the design and implementation of CWSandbox, a malware analysis tool …

[PDF][PDF] A survey on honeypot software and data analysis

M Nawrocki, M Wählisch, TC Schmidt, C Keil… - arXiv preprint arXiv …, 2016 - arxiv.org
A Survey on Honeypot Software and Data Analysis Page 1 A Survey on Honeypot Software and
Data Analysis Marcin Nawrocki ∗ , Matthias Wählisch ∗ , Thomas C. Schmidt † , Christian Keil ‡ …