A survey on malicious domains detection through DNS data analysis

Y Zhauniarovich, I Khalil, T Yu, M Dacier - ACM Computing Surveys …, 2018 - dl.acm.org
Malicious domains are one of the major resources required for adversaries to run attacks
over the Internet. Due to the important role of the Domain Name System (DNS), extensive …

Paint it black: Evaluating the effectiveness of malware blacklists

M Kührer, C Rossow, T Holz - … in Attacks, Intrusions and Defenses: 17th …, 2014 - Springer
Blacklists are commonly used to protect computer systems against the tremendous number
of malware threats. These lists include abusive hosts such as malware sites or botnet …

Permissionless proof‐of‐reputation‐X: A hybrid reputation‐based consensus algorithm for permissionless blockchains

J Bou Abdo, R El Sibai… - Transactions on Emerging …, 2021 - Wiley Online Library
Over the past years, blockchain technology has become more and more interesting since its
ability to carry out transactions without any mediator. To ensure the transactions' reliability …

A fuzzy ontology and SVM–based Web content classification system

F Ali, P Khan, K Riaz, D Kwak, T Abuhmed… - IEEE …, 2017 - ieeexplore.ieee.org
The volume of adult content on the world wide web is increasing rapidly. This makes an
automatic detection of adult content a more challenging task, when eliminating access to ill …

On the ground truth problem of malicious DNS traffic analysis

M Stevanovic, JM Pedersen, A D'Alconzo, S Ruehrup… - computers & …, 2015 - Elsevier
DNS is often abused by Internet criminals in order to provide flexible and resilient hosting of
malicious content and reliable communication within their network architecture. The majority …

On the use of machine learning for identifying botnet network traffic

M Stevanovic, JM Pedersen - Journal of Cyber Security and Mobility, 2016 - vbn.aau.dk
During the last decade significant scientific efforts have been invested in the development of
methods that could provide efficient and effective botnet detection. As a result, an array of …

Adaptive blacklist-based packet filter with a statistic-based approach in network intrusion detection

Y Meng, LF Kwok - Journal of Network and Computer Applications, 2014 - Elsevier
Network intrusion detection systems (NIDS) are widely deployed in various network
environments. Compared to an anomaly based NIDS, a signature-based NIDS is more …

[PDF][PDF] Towards Measuring the Effectiveness of Telephony Blacklists.

S Pandit, R Perdisci, M Ahamad, P Gupta - NDSS, 2018 - ndss-symposium.org
The convergence of telephony with the Internet has led to numerous new attacks that make
use of phone calls to defraud victims. In response to the increasing number of unwanted or …

[PDF][PDF] Countering Malicious Processes with Process-DNS Association.

S Sivakorn, K Jee, Y Sun, L Korts-Pärn, Z Li… - NDSS, 2019 - kangkookjee.io
Modern malware and cyber attacks depend heavily on DNS services to make their
campaigns reliable and difficult to track. Monitoring network DNS activities and blocking …

Analysis and takeover of the bitcoin-coordinated pony malware

T Taniguchi, H Griffioen, C Doerr - Proceedings of the 2021 ACM Asia …, 2021 - dl.acm.org
Malware, like all products and services, evolves with bursts of innovation. These advances
usually happen whenever security controls get''good enough''to significantly impact the …