Darknet as a source of cyber intelligence: Survey, taxonomy, and characterization

C Fachkha, M Debbabi - IEEE Communications Surveys & …, 2015 - ieeexplore.ieee.org
Today, the Internet security community largely emphasizes cyberspace monitoring for the
purpose of generating cyber intelligence. In this paper, we present a survey on darknet. The …

Behavior analysis of long-term cyber attacks in the darknet

T Ban, L Zhu, J Shimamura, S Pang, D Inoue… - … , ICONIP 2012, Doha …, 2012 - Springer
Darknet monitoring provides us an effective way to countermeasure cyber attacks that pose
a significant threat to network security and management. This paper aims to characterize the …

Exsmal: Edi/xml semi-automatic schema matching algorithm

U Chukmol, R Rifaieh… - … Conference on E …, 2005 - ieeexplore.ieee.org
We describe a schema matching algorithm EXSMAL that automates the semantic
correspondence discovery between the EDI (electronic data interchange) messages of …

Segmenting large-scale cyber attacks for online behavior model generation

S Strapp, SJ Yang - … Conference on Social Computing, Behavioral-Cultural …, 2014 - Springer
Large-scale cyber attack traffic can present challenges to identify which packets are relevant
and what attack behaviors are present. Existing works on Host or Flow Clustering attempt to …

Analysis of spoofed IP traffic using time-to-live and identification fields in IP headers

M Ohta, Y Kanda, K Fukuda… - 2011 IEEE Workshops of …, 2011 - ieeexplore.ieee.org
Internet services are often exposed to many kinds of threats such as the distributed denial of
service (DDoS), viruses, and worms. Since these threats cause an adverse effect on the …

Detecting anomalies in network traffic using Entropy and Mahalanobis distance

J Santiago-Paz, D Torres-Roman… - CONIELECOMP …, 2012 - ieeexplore.ieee.org
This paper proposes an Entropy-Mahalanobis-based methodology to detect certain
anomalies in IP traffic. The balanced estimator II is used to model the normal behavior of two …

An approach to dynamic analysis of multidimensional quality characteristics in automobile body-in-white assembly

Y Jiang, K Yang - International Journal of Industrial and …, 2012 - inderscienceonline.com
The analysis of the multivariate dynamic information contained in the observed data of
automobile build has been one of the significant and interesting topics. In this paper, we …

Darknet as a Source of Cyber Threat Intelligence: Investigating Distributed and Reflection Denial of Service Attacks

C Fachkha - 2015 - spectrum.library.concordia.ca
Cyberspace has become a massive battlefield between computer criminals and computer
security experts. In addition, large-scale cyber attacks have enormously matured and …

Application of BP neural network based on principal component analysis in grain yield prediction

Z Wang, B Li, L Cao - The 2nd International Conference on …, 2010 - ieeexplore.ieee.org
Based on the problem that when BP neural network is used in grain yield prediction, if the
input space is too self relevant, the predicting accuracy of BP neural network would drop …

Segmentation and Model Generation for Large-Scale Cyber Attacks

SE Strapp - 2013 - repository.rit.edu
Raw Cyber attack traffic can present more questions than answers to security analysts.
Especially with large-scale observables it is difficult to identify which packets are relevant …