Technical aspects of cyber kill chain

T Yadav, AM Rao - Security in Computing and Communications: Third …, 2015 - Springer
Recent trends in targeted cyber-attacks has increased the interest of research in the field of
cyber security. Such attacks have massive disruptive effects on organizations, enterprises …

Deciphering malware's use of TLS (without decryption)

B Anderson, S Paul, D McGrew - Journal of Computer Virology and …, 2018 - Springer
The use of TLS by malware poses new challenges to network threat detection because
traditional pattern-matching techniques can no longer be applied to its messages. However …

Paint it black: Evaluating the effectiveness of malware blacklists

M Kührer, C Rossow, T Holz - … in Attacks, Intrusions and Defenses: 17th …, 2014 - Springer
Blacklists are commonly used to protect computer systems against the tremendous number
of malware threats. These lists include abusive hosts such as malware sites or botnet …

PsyBoG: A scalable botnet detection method for large-scale DNS traffic

J Kwon, J Lee, H Lee, A Perrig - Computer Networks, 2016 - Elsevier
Abstract Domain Name System (DNS) traffic has become a rich source of information from a
security perspective. However, the volume of DNS traffic has been skyrocketing, such that …

[图书][B] Information security management systems: a novel framework and software as a tool for compliance with information security standard

H Susanto, MN Almunawar - 2018 - taylorfrancis.com
This new volume, Information Security Management Systems: A Novel Framework and
Software as a Tool for Compliance with Information Security Standard, looks at information …

Network malware classification comparison using DPI and flow packet headers

A Boukhtouta, SA Mokhov, NE Lakhdari… - Journal of Computer …, 2016 - Springer
In order to counter cyber-attacks and digital threats, security experts must generate, share,
and exploit cyber-threat intelligence generated from malware. In this research, we address …

Traffic fingerprinting attacks on internet of things using machine learning

M Skowron, A Janicki, W Mazurczyk - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) concept has been widely adopted and Internet connected
devices enter more and more areas of our everyday lives. However, their limited security …

Combating the evasion mechanisms of social bots

Y Ji, Y He, X Jiang, J Cao, Q Li - computers & security, 2016 - Elsevier
The detection and anti-detection of social botnets constitute an arms race that enables social
botnets to evolve quickly. Existing host-side detection approaches cannot easily detect every …

ProVeX: Detecting Botnets with Encrypted Command and Control Channels

C Rossow, CJ Dietrich - Detection of Intrusions and Malware, and …, 2013 - Springer
Abstract. Botmasters increasingly encrypt command-and-control (C&C) communication to
evade existing intrusion detection systems. Our detailed C&C traffic analysis shows that at …

Network intrusion detection in encrypted traffic

E Papadogiannaki, G Tsirantonakis… - 2022 IEEE Conference …, 2022 - ieeexplore.ieee.org
Traditional signature-based intrusion detection systems inspect packet headers and
payloads to report any malicious or abnormal traffic behavior that is observed in the network …