A survey on systems security metrics

M Pendleton, R Garcia-Lebron, JH Cho… - ACM Computing Surveys …, 2016 - dl.acm.org
Security metrics have received significant attention. However, they have not been
systematically explored based on the understanding of attack-defense interactions, which …

Botnets: A survey

SSC Silva, RMP Silva, RCG Pinto, RM Salles - Computer Networks, 2013 - Elsevier
Botnets, which are networks formed by malware-compromised machines, have become a
serious threat to the Internet. Such networks have been created to conduct large-scale …

Tracking ransomware end-to-end

DY Huang, MM Aliapoulios, VG Li… - … IEEE Symposium on …, 2018 - ieeexplore.ieee.org
Ransomware is a type of malware that encrypts the files of infected hosts and demands
payment, often in a crypto-currency like Bitcoin. In this paper, we create a measurement …

Goal-oriented requirements engineering: A guided tour

A Van Lamsweerde - Proceedings fifth ieee international …, 2001 - ieeexplore.ieee.org
Goals capture, at different levels of abstraction, the various objectives the system under
consideration should achieve. Goal-oriented requirements engineering is concerned with …

[PDF][PDF] Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection

G Gu, R Perdisci, J Zhang, W Lee - 2008 - usenix.org
Botnets are now the key platform for many Internet attacks, such as spam, distributed denial-
of-service (DDoS), identity theft, and phishing. Most of the current botnet detection …

Your botnet is my botnet: analysis of a botnet takeover

B Stone-Gross, M Cova, L Cavallaro, B Gilbert… - Proceedings of the 16th …, 2009 - dl.acm.org
Botnets, networks of malware-infected machines that are controlled by an adversary, are the
root cause of a large number of security problems on the Internet. A particularly …

The crossfire attack

MS Kang, SB Lee, VD Gligor - 2013 IEEE symposium on …, 2013 - ieeexplore.ieee.org
We present the Crossfire attack--a powerful attack that degrades and often cuts off network
connections to a variety of selected server targets (eg, servers of an enterprise, a city, a …

BotSniffer: Detecting botnet command and control channels in network traffic

G Gu, J Zhang, W Lee - 2008 - corescholar.libraries.wright.edu
Botnets are now recognized as one of the most serious security threats. In contrast to
previous malware, botnets have the characteristic of a command and control (C&C) channel …

Bothunter: Detecting malware infection through ids-driven dialog correlation.

G Gu, PA Porras, V Yegneswaran, MW Fong… - USENIX Security …, 2007 - usenix.org
We present a new kind of network perimeter monitoring strategy, which focuses on
recognizing the infection and coordination dialog that occurs during a successful malware …

A survey of botnet and botnet detection

M Feily, A Shahrestani… - 2009 Third International …, 2009 - ieeexplore.ieee.org
Among the various forms of malware, botnets are emerging as the most serious threat
against cyber-security as they provide a distributed platform for several illegal activities such …