A survey on systems security metrics
M Pendleton, R Garcia-Lebron, JH Cho… - ACM Computing Surveys …, 2016 - dl.acm.org
Security metrics have received significant attention. However, they have not been
systematically explored based on the understanding of attack-defense interactions, which …
systematically explored based on the understanding of attack-defense interactions, which …
Detection of malicious web activity in enterprise computer networks
A processing device in one embodiment comprises a processor coupled to a memory and is
configured to obtain internal log data of a computer network of an enterprise, to extract …
configured to obtain internal log data of a computer network of an enterprise, to extract …
Detecting environment-sensitive malware
M Lindorfer, C Kolbitsch… - Recent Advances in …, 2011 - Springer
The execution of malware in an instrumented sandbox is a widespread approach for the
analysis of malicious code, largely because it sidesteps the difficulties involved in the static …
analysis of malicious code, largely because it sidesteps the difficulties involved in the static …
Disclosure: detecting botnet command and control servers through large-scale netflow analysis
Botnets continue to be a significant problem on the Internet. Accordingly, a great deal of
research has focused on methods for detecting and mitigating the effects of botnets. Two of …
research has focused on methods for detecting and mitigating the effects of botnets. Two of …
Prudent practices for designing malware experiments: Status quo and outlook
Malware researchers rely on the observation of malicious code in execution to collect
datasets for a wide array of experiments, including generation of detection models, study of …
datasets for a wide array of experiments, including generation of detection models, study of …
SoK: Quantifying cyber risk
This paper introduces a causal model inspired by structural equation modeling that explains
cyber risk outcomes in terms of latent factors measured using reflexive indicators. First, we …
cyber risk outcomes in terms of latent factors measured using reflexive indicators. First, we …
Click trajectories: End-to-end analysis of the spam value chain
Spam-based advertising is a business. While it has engendered both widespread antipathy
and a multi-billion dollar anti-spam industry, it continues to exist because it fuels a profitable …
and a multi-billion dollar anti-spam industry, it continues to exist because it fuels a profitable …
Paint it black: Evaluating the effectiveness of malware blacklists
Blacklists are commonly used to protect computer systems against the tremendous number
of malware threats. These lists include abusive hosts such as malware sites or botnet …
of malware threats. These lists include abusive hosts such as malware sites or botnet …
Abuse reporting and the fight against cybercrime
Cybercriminal activity has exploded in the past decade, with diverse threats ranging from
phishing attacks to botnets and drive-by-downloads afflicting millions of computers …
phishing attacks to botnets and drive-by-downloads afflicting millions of computers …
[PDF][PDF] The Underground Economy of Spam: A Botmaster's Perspective of Coordinating {Large-Scale} Spam Campaigns
Spam accounts for a large portion of the email exchange on the Internet. In addition to being
a nuisance and a waste of costly resources, spam is used as a delivery mechanism for many …
a nuisance and a waste of costly resources, spam is used as a delivery mechanism for many …