A survey on malicious domains detection through DNS data analysis

Y Zhauniarovich, I Khalil, T Yu, M Dacier - ACM Computing Surveys …, 2018 - dl.acm.org
Malicious domains are one of the major resources required for adversaries to run attacks
over the Internet. Due to the important role of the Domain Name System (DNS), extensive …

Domain name system security and privacy: A contemporary survey

A Khormali, J Park, H Alasmary, A Anwar, M Saad… - Computer Networks, 2021 - Elsevier
Abstract The Domain Name System (DNS) is one of the most important components of
today's Internet, and is the standard naming convention between human-readable domain …

Advanced persistent threats (apt): evolution, anatomy, attribution and countermeasures

A Sharma, BB Gupta, AK Singh… - Journal of Ambient …, 2023 - Springer
In today's cyber warfare realm, every stakeholder in cyberspace is becoming more potent by
developing advanced cyber weapons. They have equipped with the most advanced …

Iotfinder: Efficient large-scale identification of iot devices via passive dns traffic analysis

R Perdisci, T Papastergiou, O Alrawi… - 2020 IEEE european …, 2020 - ieeexplore.ieee.org
Being able to enumerate potentially vulnerable IoT devices across the Internet is important,
because it allows for assessing global Internet risks and enables network operators to check …

An investigation of phishing awareness and education over time: When and how to best remind users

B Reinheimer, L Aldag, P Mayer, M Mossano… - … Symposium on Usable …, 2020 - usenix.org
Security awareness and education programmes are rolled out in more and more
organisations. However, their effectiveness over time and, correspondingly, appropriate …

Skill squatting attacks on Amazon Alexa

D Kumar, R Paccagnella, P Murley… - 27th USENIX security …, 2018 - usenix.org
The proliferation of the Internet of Things has increased reliance on voice-controlled devices
to perform everyday tasks. Although these devices rely on accurate speech recognition for …

A long way to the top: Significance, structure, and stability of internet top lists

Q Scheitle, O Hohlfeld, J Gamba, J Jelten… - Proceedings of the …, 2018 - dl.acm.org
A broad range of research areas including Internet measurement, privacy, and network
security rely on lists of target domains to be analysed; researchers make use of target lists …

Needle in a haystack: Tracking down elite phishing domains in the wild

K Tian, STK Jan, H Hu, D Yao, G Wang - Proceedings of the Internet …, 2018 - dl.acm.org
Today's phishing websites are constantly evolving to deceive users and evade the detection.
In this paper, we perform a measurement study on squatting phishing domains where the …

Detection of malicious and low throughput data exfiltration over the DNS protocol

A Nadler, A Aminov, A Shabtai - Computers & Security, 2019 - Elsevier
In the presence of security countermeasures, a malware designed for data exfiltration must
use a covert channel to achieve its goal. The Domain Name System (DNS) protocol is a …

[HTML][HTML] Towards lightweight url-based phishing detection

A Butnaru, A Mylonas, N Pitropakis - Future internet, 2021 - mdpi.com
Nowadays, the majority of everyday computing devices, irrespective of their size and
operating system, allow access to information and online services through web browsers …