Cyber scanning: a comprehensive survey
Cyber scanning refers to the task of probing enterprise networks or Internet wide services,
searching for vulnerabilities or ways to infiltrate IT assets. This misdemeanor is often the …
searching for vulnerabilities or ways to infiltrate IT assets. This misdemeanor is often the …
Modeling the propagation of worms in networks: A survey
There are the two common means for propagating worms: scanning vulnerable computers in
the network and spreading through topological neighbors. Modeling the propagation of …
the network and spreading through topological neighbors. Modeling the propagation of …
Detecting spam zombies by monitoring outgoing messages
Compromised machines are one of the key security threats on the Internet; they are often
used to launch various security attacks such as spamming and spreading malware, DDoS …
used to launch various security attacks such as spamming and spreading malware, DDoS …
An information-theoretic view of network-aware malware attacks
This work provides an information-theoretic view to better understand the relationships
between aggregated vulnerability information viewed by attackers and a class of …
between aggregated vulnerability information viewed by attackers and a class of …
[PDF][PDF] Honeypot evader: Activity-guided propagation versus counter-evasion via decoy os activity
J Rrushi - Proceedings of the 14th IEEE International Conference …, 2019 - researchgate.net
The contribution of this paper is twofold. We present honeypot evader, a red team approach
that we developed to demonstrate the inability of current honeypots to entrap decoy savvy …
that we developed to demonstrate the inability of current honeypots to entrap decoy savvy …
[PDF][PDF] Modeling and defending against internet worm attacks
Z Chen - 2007 - researchgate.net
Since the Morris worm arose in 1988, Internet worms have been a persistent security threat.
For example, the Code Red worm compromised at least 359,000 machines in 24 hours on …
For example, the Code Red worm compromised at least 359,000 machines in 24 hours on …
Energy harvesting communications: part 2 [Guest Editorial]
Energy harvesting communications: Part 2 [Guest Editorial] Page 1 ver the last decade,
energy harvesting has emerged as a promising approach to enable self-sufficient and self-sustaining …
energy harvesting has emerged as a promising approach to enable self-sufficient and self-sustaining …
Emerging malware threats: The case of ransomware
A Vardalaki, V Vlachos - Cybersecurity Issues in Emerging …, 2021 - taylorfrancis.com
The cyberthreat landscape is constantly shifting as malicious actors find novel ways to take
advantage of the security, infrastructure, and social weaknesses that arise. Ingenuity and …
advantage of the security, infrastructure, and social weaknesses that arise. Ingenuity and …
Toward early warning against Internet worms based on critical‐sized networks
E Magkos, M Avlonitis, P Kotzanikolaou… - Security and …, 2013 - Wiley Online Library
In this paper, we build on a recent worm propagation stochastic model, in which random
effects during worm spreading were modeled by means of a stochastic differential equation …
effects during worm spreading were modeled by means of a stochastic differential equation …
Darknet-based inference of internet worm temporal characteristics
Internet worm attacks pose a significant threat to network security and management. In this
work, we coin the term Internet worm tomography as inferring the characteristics of Internet …
work, we coin the term Internet worm tomography as inferring the characteristics of Internet …