Analyzing the usefulness of the DARPA OpTC dataset in cyber threat detection research

MM Anjum, S Iqbal, B Hamelin - … of the 26th ACM Symposium on Access …, 2021 - dl.acm.org
Maintaining security and privacy in real-world enterprise networks is becoming more and
more challenging. Cyber actors are increasingly employing previously unreported and state …

A survey on threat hunting in enterprise networks

B Nour, M Pourzandi, M Debbabi - … Communications Surveys & …, 2023 - ieeexplore.ieee.org
With the rapidly evolving technological landscape, the huge development of the Internet of
Things, and the embracing of digital transformation, the world is witnessing an explosion in …

[HTML][HTML] Unraveled—A semi-synthetic dataset for Advanced Persistent Threats

S Myneni, K Jha, A Sabur, G Agrawal, Y Deng… - Computer Networks, 2023 - Elsevier
U nraveled is a novel cybersecurity dataset capturing Advanced Persistent Threat (APT)
attacks not available in the public domain. Existing cybersecurity datasets lack coherent …

Csc-detector: A system to infer large-scale probing campaigns

E Bou-Harb, C Assi, M Debbabi - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
This paper uniquely leverages unsolicited real darknet data to propose a novel system, CSC-
Detector, that aims at identifying Cyber Scanning Campaigns. The latter define a new …

Holmes: real-time apt detection through correlation of suspicious information flows

SM Milajerdi, R Gjomemo, B Eshete… - … IEEE Symposium on …, 2019 - ieeexplore.ieee.org
In this paper, we present HOLMES, a system that implements a new approach to the
detection of Advanced and Persistent Threats (APTs). HOLMES is inspired by several case …

Advanced persistent threats: minimising the damage

R Brewer - Network security, 2014 - Elsevier
According to the Office of Cyber Security and Information Assurance, 93% of large
corporations and 87% of small businesses reported some form of cyber breach in 2013. 1 …

Cyber kill chain based threat taxonomy and its application on cyber common operational picture

S Cho, I Han, H Jeong, J Kim, S Koo… - … Conference On Cyber …, 2018 - ieeexplore.ieee.org
Over a decade, intelligent and persistent forms of cyber threats have been damaging to the
organizations' cyber assets and missions. In this paper, we analyze current cyber kill chain …

Assessing internet-wide cyber situational awareness of critical sectors

M Husák, N Neshenko, MS Pour, E Bou-Harb… - Proceedings of the 13th …, 2018 - dl.acm.org
In this short paper, we take a first step towards empirically assessing Internet-wide malicious
activities generated from and targeted towards Internet-scale business sectors (ie, financial …

Autonomous security analysis and penetration testing

A Chowdhary, D Huang, JS Mahendran… - … on Mobility, Sensing …, 2020 - ieeexplore.ieee.org
Security Assessment of large networks is a challenging task. Penetration testing (pentesting)
is a method of analyzing the attack surface of a network to find security vulnerabilities …

A framework for data-driven physical security and insider threat detection

V Mavroeidis, K Vishi, A Jøsang - 2018 IEEE/ACM International …, 2018 - ieeexplore.ieee.org
This paper presents PSO, an ontological framework and a methodology for improving
physical security and insider threat detection. PSO can facilitate forensic data analysis and …