Darknet as a source of cyber intelligence: Survey, taxonomy, and characterization

C Fachkha, M Debbabi - IEEE Communications Surveys & …, 2015 - ieeexplore.ieee.org
Today, the Internet security community largely emphasizes cyberspace monitoring for the
purpose of generating cyber intelligence. In this paper, we present a survey on darknet. The …

Automatic analysis of malware behavior using machine learning

K Rieck, P Trinius, C Willems… - Journal of computer …, 2011 - content.iospress.com
Malicious software–so called malware–poses a major threat to the security of computer
systems. The amount and diversity of its variants render classic security defenses ineffective …

Learning and classification of malware behavior

K Rieck, T Holz, C Willems, P Düssel… - … Conference on Detection …, 2008 - Springer
Malicious software in form of Internet worms, computer viruses, and Trojan horses poses a
major threat to the security of networked systems. The diversity and amount of its variants …

[PDF][PDF] A survey on honeypot software and data analysis

M Nawrocki, M Wählisch, TC Schmidt, C Keil… - arXiv preprint arXiv …, 2016 - arxiv.org
A Survey on Honeypot Software and Data Analysis Page 1 A Survey on Honeypot Software and
Data Analysis Marcin Nawrocki ∗ , Matthias Wählisch ∗ , Thomas C. Schmidt † , Christian Keil ‡ …

[PDF][PDF] Models and measures for correlation in cyber-insurance.

R Böhme, G Kataria - Weis, 2006 - core.ac.uk
High correlation in failure of information systems due to worms and viruses has been cited
as major impediment to cyber-insurance. However, of the many cyber-risk classes that …

Scriptgen: an automated script generation tool for honeyd

C Leita, K Mermoud, M Dacier - 21st Annual Computer Security …, 2005 - ieeexplore.ieee.org
Honeyd (N. Provos, 2004) is a popular tool developed by Niels Provos that offers a simple
way to emulate services offered by several machines on a single PC. It is a so called low …

Lessons learned from the deployment of a high-interaction honeypot

E Alata, V Nicomette, M Kaâniche… - 2006 Sixth European …, 2006 - ieeexplore.ieee.org
This paper presents an experimental study and the lessons learned from the observation of
the attackers when logged on a compromised machine. The results are based on a six …

[PDF][PDF] Feature selection and extraction for malware classification.

CT Lin, NJ Wang, H Xiao, C Eckert - J. Inf. Sci. Eng., 2015 - researchgate.net
The explosive amount of malware continues their threats in network and operating systems.
Signature-based method is widely used for detecting malware. Unfortunately, it is unable to …

Profiling attacker behavior following SSH compromises

D Ramsbrock, R Berthier… - 37th Annual IEEE/IFIP …, 2007 - ieeexplore.ieee.org
This practical experience report presents the results of an experiment aimed at building a
profile of attacker behavior following a remote compromise. For this experiment, we utilized …

Behind the scenes of online attacks: an analysis of exploitation behaviors on the web

D Canali, D Balzarotti - 20th Annual Network & Distributed System …, 2013 - hal.science
Web attacks are nowadays one of the major threats on the Internet, and several studies have
analyzed them, providing details on how they are performed and how they spread. However …