[HTML][HTML] A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

A survey on malicious domains detection through DNS data analysis

Y Zhauniarovich, I Khalil, T Yu, M Dacier - ACM Computing Surveys …, 2018 - dl.acm.org
Malicious domains are one of the major resources required for adversaries to run attacks
over the Internet. Due to the important role of the Domain Name System (DNS), extensive …

Malicious URL detection using machine learning: A survey

D Sahoo, C Liu, SCH Hoi - arXiv preprint arXiv:1701.07179, 2017 - arxiv.org
Malicious URL, aka malicious website, is a common and serious threat to cybersecurity.
Malicious URLs host unsolicited content (spam, phishing, drive-by exploits, etc.) and lure …

Adopting automated whitelist approach for detecting phishing attacks

NA Azeez, S Misra, IA Margaret, L Fernandez-Sanz - Computers & Security, 2021 - Elsevier
Phishing is considered a great scourge in cyberspace. Presently, there are two major
challenges known with the existing anti-phishing solutions. Low detection rate and lack of …

{HinDom}: A robust malicious domain detection system based on heterogeneous information network with transductive classification

X Sun, M Tong, J Yang, L Xinran, L Heng - … International Symposium on …, 2019 - usenix.org
Domain name system (DNS) is a crucial part of the Internet, yet has been widely exploited by
cyber attackers. Apart from making static methods like blacklists or sinkholes infeasible …

A keyword-based combination approach for detecting phishing webpages

Y Ding, N Luktarhan, K Li, W Slamu - computers & security, 2019 - Elsevier
In this paper, the Search & Heuristic Rule & Logistic Regression (SHLR) combination
detection method is proposed for detecting the obfuscation techniques commonly used by …

[PDF][PDF] A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security

M Safaei Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - par.nsf.gov
abstract As the Internet has transformed into a critical infrastructure, society has become
more vulnerable to its security flaws. Despite substantial efforts to address many of these …

Improving maliciousness estimation of indicator of compromise using graph convolutional networks

Y Kazato, Y Nakagawa… - 2020 IEEE 17th Annual …, 2020 - ieeexplore.ieee.org
Cyber threat intelligence (CTI) sharing is growing in popularity and has become one of the
key functions to protect end-users and network services from sophisticated cyber attacks …

Wolf in Sheep's Clothing: Evaluating Security Risks of the Undelegated Record on DNS Hosting Services

F Zhang, Y Zhang, B Liu, E Alowaisheq, L Ying… - Proceedings of the …, 2023 - dl.acm.org
Leveraging DNS for covert communications is appealing since most networks allow DNS
traffic, especially the ones directed toward renowned DNS hosting services. Unfortunately …

[HTML][HTML] DomainChroma: Building actionable threat intelligence from malicious domain names

D Chiba, M Akiyama, T Yagi, K Hato, T Mori, S Goto - Computers & Security, 2018 - Elsevier
Since the 1980s, domain names and the domain name system (DNS) have been used and
abused. Although legitimate Internet users rely on domain names as indispensable …