Survey and taxonomy of adversarial reconnaissance techniques

S Roy, N Sharmin, JC Acosta, C Kiekintveld… - ACM Computing …, 2022 - dl.acm.org
Adversaries are often able to penetrate networks and compromise systems by exploiting
vulnerabilities in people and systems. The key to the success of these attacks is information …

Deceiving network reconnaissance using SDN-based virtual topologies

S Achleitner, TF La Porta, P McDaniel… - … on Network and …, 2017 - ieeexplore.ieee.org
Advanced targeted cyber attacks often rely on reconnaissance missions to gather
information about potential targets, their characteristics and location to identify vulnerabilities …

Multi-agent reinforcement learning for intrusion detection

A Servin, D Kudenko - European Symposium on Adaptive Agents and …, 2005 - Springer
Abstract Intrusion Detection Systems (IDS) have been investigated for many years and the
field has matured. Nevertheless, there are still important challenges, eg, how an IDS can …

[PDF][PDF] Fine-hearing Google Home: why silence will not protect your privacy.

D Caputo, L Verderame, A Ranieri… - J. Wirel. Mob …, 2020 - researchgate.net
Smart speakers and voice-based virtual assistants are used to retrieve information, interact
with other devices, and command a variety of Internet of Things (IoT) nodes. To this aim …

Unsupervised online anomaly detection to identify cyber-attacks on internet connected photovoltaic system inverters

CB Jones, A Chavez… - 2021 IEEE Power …, 2021 - ieeexplore.ieee.org
Often machine learning applications rely on batch learning for training, but a complete set of
network communications data may not be readily available. Therefore, this work evaluates …

Who's your best friend? Targeted privacy attacks in location-sharing social networks

V Kostakos, J Venkatanathan, B Reynolds… - Proceedings of the 13th …, 2011 - dl.acm.org
This paper presents a study that aims to answer two important questions related to targeted
location-sharing privacy attacks:(1) given a group of users and their social graph, is it …

Optimising IDS sensor placement

H Chen, JA Clark, SA Shaikh… - 2010 International …, 2010 - ieeexplore.ieee.org
In large network environments multiple intrusion detection sensors are needed to
adequately monitor network traffic. However, deploying and managing additional sensors on …

Large-scale analysis of infrastructure-leaking DNS servers

D Tatang, C Schneider, T Holz - Detection of Intrusions and Malware, and …, 2019 - Springer
Abstract The Domain Name System (DNS) is a fundamental backbone service of the
Internet. In practice, this infrastructure often shows flaws, which indicate that measuring the …

[PDF][PDF] Employing the CEP paradigm for network analysis and surveillance

R Gad, M Kappes, J Boubeta-Puig, I Medina-Bulo - AICT 2013, 2013 - academia.edu
In this paper, we present a network analysis and surveillance system based on the Complex
Event Processing (CEP) paradigm. We demonstrate how complex event hierarchies based …

Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks

HK Kalutarage, SA Shaikh, IP Wickramasinghe… - Computers & Electrical …, 2015 - Elsevier
Stealthy attackers move patiently through computer networks–taking days, weeks or months
to accomplish their objectives in order to avoid detection. As networks scale up in size and …