The use of TLS by malware poses new challenges to network threat detection because traditional pattern-matching techniques can no longer be applied to its messages. However …
M Kührer, C Rossow, T Holz - … in Attacks, Intrusions and Defenses: 17th …, 2014 - Springer
Blacklists are commonly used to protect computer systems against the tremendous number of malware threats. These lists include abusive hosts such as malware sites or botnet …
Abstract Domain Name System (DNS) traffic has become a rich source of information from a security perspective. However, the volume of DNS traffic has been skyrocketing, such that …
This new volume, Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard, looks at information …
In order to counter cyber-attacks and digital threats, security experts must generate, share, and exploit cyber-threat intelligence generated from malware. In this research, we address …
The Internet of Things (IoT) concept has been widely adopted and Internet connected devices enter more and more areas of our everyday lives. However, their limited security …
Y Ji, Y He, X Jiang, J Cao, Q Li - computers & security, 2016 - Elsevier
The detection and anti-detection of social botnets constitute an arms race that enables social botnets to evolve quickly. Existing host-side detection approaches cannot easily detect every …
Traditional signature-based intrusion detection systems inspect packet headers and payloads to report any malicious or abnormal traffic behavior that is observed in the network …