Deep learning and big data technologies for IoT security

MA Amanullah, RAA Habeeb, FH Nasaruddin… - Computer …, 2020 - Elsevier
Technology has become inevitable in human life, especially the growth of Internet of Things
(IoT), which enables communication and interaction with various devices. However, IoT has …

Understanding cybercrime in 'real world'policing and law enforcement

J Curtis, G Oxburgh - The Police Journal, 2023 - journals.sagepub.com
Cybercrime is a growing issue, still not fully understood by researchers or policing/law
enforcement communities. UK Government reports assert that victims of cybercrime were …

The evolution of bashlite and mirai iot botnets

A Marzano, D Alexander, O Fonseca… - … IEEE Symposium on …, 2018 - ieeexplore.ieee.org
Vulnerable IoT devices are powerful platforms for building botnets that cause billion-dollar
losses every year. In this work, we study Bashlite botnets and their successors, Mirai botnets …

[PDF][PDF] Sunrise to sunset: Analyzing the end-to-end life cycle and effectiveness of phishing attacks at scale

A Oest, P Zhang, B Wardman, E Nunes… - 29th {USENIX} Security …, 2020 - usenix.org
Despite an extensive anti-phishing ecosystem, phishing attacks continue to capitalize on
gaps in detection to reach a significant volume of daily victims. In this paper, we isolate and …

{PhishTime}: Continuous longitudinal measurement of the effectiveness of anti-phishing blacklists

A Oest, Y Safaei, P Zhang, B Wardman… - 29th USENIX Security …, 2020 - usenix.org
Due to their ubiquity in modern web browsers, anti-phishing blacklists are a key defense
against large-scale phishing attacks. However, sophistication in phishing websites—such as …

Combating advanced persistent threats: From network event correlation to incident detection

I Friedberg, F Skopik, G Settanni, R Fiedler - Computers & Security, 2015 - Elsevier
An advanced persistent threat (also known as APT) is a deliberately slow-moving
cyberattack that is applied to quietly compromise interconnected information systems without …

Bitcoin money laundering: mixed results? An explorative study on money laundering of cybercrime proceeds using bitcoin

R Van Wegberg, JJ Oerlemans… - Journal of Financial …, 2018 - emerald.com
Purpose This paper aims to shed light into money laundering using bitcoin. Digital payment
methods are increasingly used by criminals to launder money obtained through cybercrime …

Systematically understanding the cyber attack business: A survey

K Huang, M Siegel, S Madnick - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
Cyber attacks are increasingly menacing businesses. Based on the literature review and
publicly available reports, this article conducts an extensive and consistent survey of the …

Booters—An analysis of DDoS-as-a-service attacks

JJ Santanna, R van Rijswijk-Deij… - 2015 IFIP/IEEE …, 2015 - ieeexplore.ieee.org
In 2012, the Dutch National Research and Education Network, SURFnet, observed a
multitude of Distributed Denial of Service (DDoS) attacks against educational institutions …

Advances in IoT security: Vulnerabilities, enabled criminal services, attacks, and countermeasures

YR Siwakoti, M Bhurtel, DB Rawat… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Although the Internet of Things (IoT) incorporates millions of heterogeneous devices to
provide advanced intelligent services and has greatly impacted our lives over time, it has a …