Implementing data exfiltration defense in situ: a survey of countermeasures and human involvement

MH Chung, Y Yang, L Wang, G Cento, K Jerath… - ACM Computing …, 2023 - dl.acm.org
In this article we consider the problem of defending against increasing data exfiltration
threats in the domain of cybersecurity. We review existing work on exfiltration threats and …

Detecting cyberthreats in Metaverse learning platforms using an explainable DNN

EC Nkoro, CI Nwakanma, JM Lee, DS Kim - Internet of Things, 2024 - Elsevier
The rapid integration of the Internet of Artificial Intelligence and Internet of Things (AI-IoT)
technologies has given rise to a pivotal element of the upcoming digital era, the Metaverse …

[PDF][PDF] A Survey on Network Security Monitoring: Tools and Functionalities

ZS Younus, M Alanezi - Mustansiriyah Journal of Pure and Applied Sciences, 2023 - iasj.net
Recently, cybersecurity breaches have become more common, with varying levels of impact
ranging from simple to major losses of financial resources or data. The network …

Self-Training of Cyber-Threat Classification Model With Threat-Payload Centric Augmentation

JY Kim, HY Kwon - IEEE Transactions on Industrial Informatics, 2024 - ieeexplore.ieee.org
Deep learning (DL)-based threat classification has been investigated for effective analysis of
threat events to minimize the human's resources in security operation centers (SOC) …

A method for insider threat assessment by modeling the internal employee interactions

H Sepehrzadeh - International Journal of Information Security, 2023 - Springer
Insider's information security threat is one of the most critical issues in organizations. Due to
their access to the assets and their knowledge about the systems, they pose a significant …

Cybersecurity in the Quantum Era: Assessing the Impact of Quantum Computing on Infrastructure

Y Baseri, V Chouhan, A Ghorbani - arXiv preprint arXiv:2404.10659, 2024 - arxiv.org
The emergence of quantum computing presents a double-edged sword for cybersecurity.
While its immense power holds promise for advancements in various fields, it also threatens …

Detect and Mitigate Cyberattacks Using SIEM

ZS Younus, M Alanezi - 2023 16th International Conference on …, 2023 - ieeexplore.ieee.org
Cybersecurity is crucial to protect network resources and reduce the risk of cyberattacks like
denial of service (DOS) and file modification. Security tools like intrusion detection and …

Interactive Machine Learning in Cybersecurity: Using Human Expertise More Effectively

MHM Chung - 2023 - search.proquest.com
Cybersecurity is increasingly important in a world where malicious actors seek to profit from
various forms of data exfiltration. In this dissertation I examine the potential for improving the …

Assessing the Challenges Faced by Security Operations Centres (SOC)

K Zidan, A Alam, J Allison, A Al-sherbaz - Future of Information and …, 2024 - Springer
Cyber security threats are increasing rapidly, and due to this organisations are utilising
Security Operations Centres (SOC) to monitor their network and to observe activities by …

An Analysis of Key Tools for Detecting Cross-Site Scripting Attacks on Web-Based Systems

H Kissoon, G Bekaroo - … on Innovations and Interdisciplinary Solutions for …, 2023 - Springer
During the previous few years, there has been an escalating number of cyberattacks against
web-based systems, that adversely resulted in significant data breaches, losses and …