A survey on systems security metrics

M Pendleton, R Garcia-Lebron, JH Cho… - ACM Computing Surveys …, 2016 - dl.acm.org
Security metrics have received significant attention. However, they have not been
systematically explored based on the understanding of attack-defense interactions, which …

Detection of malicious web activity in enterprise computer networks

AM Oprea, Z Li, R Norris, KD Bowers - US Patent 9,838,407, 2017 - Google Patents
A processing device in one embodiment comprises a processor coupled to a memory and is
configured to obtain internal log data of a computer network of an enterprise, to extract …

Detecting environment-sensitive malware

M Lindorfer, C Kolbitsch… - Recent Advances in …, 2011 - Springer
The execution of malware in an instrumented sandbox is a widespread approach for the
analysis of malicious code, largely because it sidesteps the difficulties involved in the static …

Disclosure: detecting botnet command and control servers through large-scale netflow analysis

L Bilge, D Balzarotti, W Robertson, E Kirda… - Proceedings of the 28th …, 2012 - dl.acm.org
Botnets continue to be a significant problem on the Internet. Accordingly, a great deal of
research has focused on methods for detecting and mitigating the effects of botnets. Two of …

Prudent practices for designing malware experiments: Status quo and outlook

C Rossow, CJ Dietrich, C Grier… - … IEEE symposium on …, 2012 - ieeexplore.ieee.org
Malware researchers rely on the observation of malicious code in execution to collect
datasets for a wide array of experiments, including generation of detection models, study of …

SoK: Quantifying cyber risk

DW Woods, R Böhme - 2021 IEEE Symposium on Security and …, 2021 - ieeexplore.ieee.org
This paper introduces a causal model inspired by structural equation modeling that explains
cyber risk outcomes in terms of latent factors measured using reflexive indicators. First, we …

Click trajectories: End-to-end analysis of the spam value chain

K Levchenko, A Pitsillidis, N Chachra… - … ieee symposium on …, 2011 - ieeexplore.ieee.org
Spam-based advertising is a business. While it has engendered both widespread antipathy
and a multi-billion dollar anti-spam industry, it continues to exist because it fuels a profitable …

Paint it black: Evaluating the effectiveness of malware blacklists

M Kührer, C Rossow, T Holz - … in Attacks, Intrusions and Defenses: 17th …, 2014 - Springer
Blacklists are commonly used to protect computer systems against the tremendous number
of malware threats. These lists include abusive hosts such as malware sites or botnet …

Abuse reporting and the fight against cybercrime

MH Jhaveri, O Cetin, C Gañán, T Moore… - ACM Computing Surveys …, 2017 - dl.acm.org
Cybercriminal activity has exploded in the past decade, with diverse threats ranging from
phishing attacks to botnets and drive-by-downloads afflicting millions of computers …

[PDF][PDF] The Underground Economy of Spam: A Botmaster's Perspective of Coordinating {Large-Scale} Spam Campaigns

B Stone-Gross, T Holz, G Stringhini… - 4th USENIX Workshop on …, 2011 - usenix.org
Spam accounts for a large portion of the email exchange on the Internet. In addition to being
a nuisance and a waste of costly resources, spam is used as a delivery mechanism for many …