[HTML][HTML] Ethical hacking for IoT: Security issues, challenges, solutions and recommendations

JPA Yaacoub, HN Noura, O Salman… - Internet of Things and …, 2023 - Elsevier
In recent years, attacks against various Internet-of-Things systems, networks, servers,
devices, and applications witnessed a sharp increase, especially with the presence of 35.82 …

A survey on ethical hacking: issues and challenges

JPA Yaacoub, HN Noura, O Salman… - arXiv preprint arXiv …, 2021 - arxiv.org
Security attacks are growing in an exponential manner and their impact on existing systems
is seriously high and can lead to dangerous consequences. However, in order to reduce the …

[HTML][HTML] The evolution of Mirai botnet scans over a six-year period

A Affinito, S Zinno, G Stanco, A Botta… - Journal of Information …, 2023 - Elsevier
The proliferation of Internet of Things devices has resulted in an increase in security
vulnerabilities and network attacks. The Mirai botnet is a well-known example of a network …

[HTML][HTML] Entropy-based application layer DDoS attack detection using artificial neural networks

K Johnson Singh, K Thongam, T De - Entropy, 2016 - mdpi.com
Distributed denial-of-service (DDoS) attack is one of the major threats to the web server. The
rapid increase of DDoS attacks on the Internet has clearly pointed out the limitations in …

Adversarial active learning

B Miller, A Kantchelian, S Afroz, R Bachwani… - Proceedings of the …, 2014 - dl.acm.org
Active learning is an area of machine learning examining strategies for allocation of finite
resources, particularly human labeling efforts and to an extent feature extraction, in …

Prometheus: Analyzing WebInject-based information stealers

A Continella, M Carminati, M Polino… - Journal of …, 2017 - content.iospress.com
Nowadays Information stealers are reaching high levels of sophistication. The number of
families and variants observed increased exponentially in the last years. Furthermore, these …

[HTML][HTML] Dynamic Malware Mitigation Strategies for IoT Networks: A Mathematical Epidemiology Approach

R Casado-Vara, M Severt, A Díaz-Longueira, ÁM Rey… - Mathematics, 2024 - mdpi.com
With the progress and evolution of the IoT, which has resulted in a rise in both the number of
devices and their applications, there is a growing number of malware attacks with higher …

[HTML][HTML] Graph-theoretic characterization of cyber-threat infrastructures

A Boukhtouta, D Mouheb, M Debbabi, O Alfandi… - Digital …, 2015 - Elsevier
In this paper, we investigate cyber-threats and the underlying infrastructures. More precisely,
we detect and analyze cyber-threat infrastructures for the purpose of unveiling key players …

Cybercrime at a scale: A practical study of deployments of HTTP-based botnet command and control panels

AK Sood, S Zeadally, R Bansal - IEEE Communications …, 2017 - ieeexplore.ieee.org
Cybercriminals deploy botnets for conducting nefarious operations on the Internet. Botnets
are managed on a large scale and harness the power of compromised machines, which are …

A survey of advances in botnet technologies

N Goodman - arXiv preprint arXiv:1702.01132, 2017 - arxiv.org
Botnets have come a long way since their inception a few decades ago. Originally toy
programs written by network hobbyists, modern-day botnets can be used by cyber criminals …