A comprehensive study on APT attacks and countermeasures for future networks and communications: challenges and solutions

S Singh, PK Sharma, SY Moon, D Moon… - The Journal of …, 2019 - Springer
Recently in the connected digital world, targeted attack has become one of the most serious
threats to conventional computing systems. Advanced persistent threat (APT) is currently …

Tracing cve vulnerability information to capec attack patterns using natural language processing techniques

K Kanakogi, H Washizaki, Y Fukazawa, S Ogata… - Information, 2021 - mdpi.com
For effective vulnerability management, vulnerability and attack information must be
collected quickly and efficiently. A security knowledge repository can collect such …

Semantics-aware detection of targeted attacks: a survey

R Luh, S Marschalek, M Kaiser, H Janicke… - Journal of Computer …, 2017 - Springer
In today's interconnected digital world, targeted attacks have become a serious threat to
conventional computer systems and critical infrastructure alike. Many researchers contribute …

Comparative evaluation of nlp-based approaches for linking capec attack patterns from cve vulnerability information

K Kanakogi, H Washizaki, Y Fukazawa, S Ogata… - Applied Sciences, 2022 - mdpi.com
Vulnerability and attack information must be collected to assess the severity of vulnerabilities
and prioritize countermeasures against cyberattacks quickly and accurately. Common …

Tracing capec attack patterns from cve vulnerability information using natural language processing technique

K Kanakogi, H Washizaki, Y Fukazawa, S Ogata… - 2021 - scholarspace.manoa.hawaii.edu
To effectively respond to vulnerabilities, information must not only be collected efficiently and
quickly but also the vulnerability and the attack techniques must be understood. A security …

BIFAD: Bio-inspired anomaly based HTTP-flood attack detection

K Munivara Prasad, A Rama Mohan Reddy… - Wireless Personal …, 2017 - Springer
Application layer based DDoS attacks have changed the way DoS attacks are taking place
with more subtle level of attacking methods being imparted, which pose an ever-increasing …

Attack plan recognition using hidden Markov and probabilistic inference

T Li, Y Liu, Y Liu, Y Xiao, NA Nguyen - Computers & Security, 2020 - Elsevier
Intrusion detection systems perform well with single attack phase but not complex multi-step
attacks which largely reduce their reliability. Multi-stage attack plan recognition aims at …

Cyber security in a complex community: A social media analysis on common vulnerabilities and exposures

M Schiappa, G Chantry, I Garibay - 2019 Sixth International …, 2019 - ieeexplore.ieee.org
Social media platforms such as Twitter, Github, and Reddit are widely used forums for
discussing all aspects of computer security. Common Vulnerabilities and Exposures (CVEs) …

Cyber-attack behavior knowledge graph based on CAPEC and CWE towards 6G

W Wang, H Zhou, K Li, Z Tu, F Liu - International Symposium on Mobile …, 2021 - Springer
Abstract 6G-oriented network intelligence needs the support of knowledge from inside and
outside the network. CAPEC and CWE are network security databases targeting attack …

HTTP flood attack detection using ontology

D Kshirsagar, S Kumar - Proceedings of the International Conference on …, 2016 - dl.acm.org
The use of web applications by the users over the Internet is increasing day by day.
Analyzing the increasing demand, many organizations are providing their services through …