Cyber scanning: a comprehensive survey

E Bou-Harb, M Debbabi, C Assi - Ieee communications surveys …, 2013 - ieeexplore.ieee.org
Cyber scanning refers to the task of probing enterprise networks or Internet wide services,
searching for vulnerabilities or ways to infiltrate IT assets. This misdemeanor is often the …

Modeling the propagation of worms in networks: A survey

Y Wang, S Wen, Y Xiang, W Zhou - … Communications Surveys & …, 2013 - ieeexplore.ieee.org
There are the two common means for propagating worms: scanning vulnerable computers in
the network and spreading through topological neighbors. Modeling the propagation of …

Detecting spam zombies by monitoring outgoing messages

Z Duan, P Chen, F Sanchez, Y Dong… - … on dependable and …, 2011 - ieeexplore.ieee.org
Compromised machines are one of the key security threats on the Internet; they are often
used to launch various security attacks such as spamming and spreading malware, DDoS …

An information-theoretic view of network-aware malware attacks

Z Chen, C Ji - IEEE Transactions on Information Forensics and …, 2009 - ieeexplore.ieee.org
This work provides an information-theoretic view to better understand the relationships
between aggregated vulnerability information viewed by attackers and a class of …

[PDF][PDF] Honeypot evader: Activity-guided propagation versus counter-evasion via decoy os activity

J Rrushi - Proceedings of the 14th IEEE International Conference …, 2019 - researchgate.net
The contribution of this paper is twofold. We present honeypot evader, a red team approach
that we developed to demonstrate the inability of current honeypots to entrap decoy savvy …

[PDF][PDF] Modeling and defending against internet worm attacks

Z Chen - 2007 - researchgate.net
Since the Morris worm arose in 1988, Internet worms have been a persistent security threat.
For example, the Code Red worm compromised at least 359,000 machines in 24 hours on …

Energy harvesting communications: part 2 [Guest Editorial]

C Yuen, M Elkashlan, Y Qian, TQ Duong… - IEEE …, 2015 - ieeexplore.ieee.org
Energy harvesting communications: Part 2 [Guest Editorial] Page 1 ver the last decade,
energy harvesting has emerged as a promising approach to enable self-sufficient and self-sustaining …

Emerging malware threats: The case of ransomware

A Vardalaki, V Vlachos - Cybersecurity Issues in Emerging …, 2021 - taylorfrancis.com
The cyberthreat landscape is constantly shifting as malicious actors find novel ways to take
advantage of the security, infrastructure, and social weaknesses that arise. Ingenuity and …

Toward early warning against Internet worms based on critical‐sized networks

E Magkos, M Avlonitis, P Kotzanikolaou… - Security and …, 2013 - Wiley Online Library
In this paper, we build on a recent worm propagation stochastic model, in which random
effects during worm spreading were modeled by means of a stochastic differential equation …

Darknet-based inference of internet worm temporal characteristics

Q Wang, Z Chen, C Chen - IEEE Transactions on Information …, 2011 - ieeexplore.ieee.org
Internet worm attacks pose a significant threat to network security and management. In this
work, we coin the term Internet worm tomography as inferring the characteristics of Internet …