Evolution of dark web threat analysis and detection: A systematic approach

S Nazah, S Huda, J Abawajy, MM Hassan - Ieee Access, 2020 - ieeexplore.ieee.org
Dark Web is one of the most challenging and untraceable mediums adopted by the cyber
criminals, terrorists, and state-sponsored spies to fulfil their illicit motives. Cyber-crimes …

Mobile security: Threats and best practices

P Weichbroth, Ł Łysik - Mobile Information Systems, 2020 - Wiley Online Library
Communicating mobile security threats and best practices has become a central objective
due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this …

A novel cyber security capability: Inferring internet-scale infections by correlating malware and probing activities

E Bou-Harb, M Debbabi, C Assi - Computer Networks, 2016 - Elsevier
This paper presents a new approach to infer worldwide malware-infected machines by
solely analyzing their generated probing activities. In contrary to other adopted methods, the …

DAEDALUS-VIZ: novel real-time 3D visualization for darknet monitoring-based alert system

D Inoue, M Eto, K Suzuki, M Suzuki… - Proceedings of the ninth …, 2012 - dl.acm.org
A darknet is a set of unused IP addresses whose monitoring is an effective way of detecting
malicious activities on the Internet. We have developed an alert system called DAEDALUS …

Empowering anti-malware research in Japan by sharing the MWS datasets

M Hatada, M Akiyama, T Matsuki… - Journal of Information …, 2015 - jstage.jst.go.jp
Substantial research has been conducted to develop proactive and reactive
countermeasures against malware threats. Gathering and analyzing data are widely …

[HTML][HTML] Multidimensional investigation of source port 0 probing

E Bou-Harb, NE Lakhdari, H Binsalleeh, M Debbabi - Digital Investigation, 2014 - Elsevier
During November 2013, the operational cyber/network security community reported an
unprecedented increase of traffic originating from source port 0. This event was deemed as …

Detection of DDoS backscatter based on traffic features of darknet TCP packets

N Furutani, T Ban, J Nakazato… - 2014 Ninth Asia …, 2014 - ieeexplore.ieee.org
In this work, we propose a method to discriminate backscatter caused by DDoS attacks from
normal traffic. Since DDoS attacks are imminent threats which could give serious economic …

Nicter: A large-scale network incident analysis system: Case studies for understanding threat landscape

M Eto, D Inoue, J Song, J Nakazato, K Ohtaka… - Proceedings of the First …, 2011 - dl.acm.org
We have been developing the Network Incident analysis Center for Tactical Emergency
Response (nicter), whose objective is to detect and identify propagating malwares. The …

Comparison of cyber attacks on services in the clearnet and darknet

Y Yannikos, QA Dang, M Steinebach - … in Digital Forensics XVII: 17th IFIP …, 2021 - Springer
Cyber attacks on clearnet services are discussed widely in the research literature. However,
a systematic comparison of cyber attacks on clearnet and darknet services has not been …

Detecting emerging large-scale vulnerability scanning activities by correlating low-interaction honeypots with darknet

R Akiyoshi, D Kotani, Y Okabe - 2018 IEEE 42nd Annual …, 2018 - ieeexplore.ieee.org
Cyberattacks such as scanning by botnet worms, falsification of web pages, and security
breaches happen on the Internet every day. To minimize damage caused by such attacks …