A review of attack graph and attack tree visual syntax in cyber security
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …
From intrusion detection to attacker attribution: A comprehensive survey of unsupervised methods
Over the last five years there has been an increase in the frequency and diversity of network
attacks. This holds true, as more and more organizations admit compromises on a daily …
attacks. This holds true, as more and more organizations admit compromises on a daily …
[PDF][PDF] A survey on various cyber attacks and their classification.
M Uma, G Padmavathi - Int. J. Netw. Secur., 2013 - ijns.jalaxy.com.tw
The role of computers and the Internet in modern society is well recognized. Recent
developments in the fields of networking and cyberspace have greatly benefited mankind …
developments in the fields of networking and cyberspace have greatly benefited mankind …
Bothunter: Detecting malware infection through ids-driven dialog correlation.
G Gu, PA Porras, V Yegneswaran, MW Fong… - USENIX Security …, 2007 - usenix.org
We present a new kind of network perimeter monitoring strategy, which focuses on
recognizing the infection and coordination dialog that occurs during a successful malware …
recognizing the infection and coordination dialog that occurs during a successful malware …
False alarm minimization techniques in signature-based intrusion detection systems: A survey
N Hubballi, V Suryanarayanan - Computer Communications, 2014 - Elsevier
A network based Intrusion Detection System (IDS) gathers and analyzes network packets
and report possible low level security violations to a system administrator. In a large network …
and report possible low level security violations to a system administrator. In a large network …
Method and system for detecting malicious and/or botnet-related domain names
R Perdisci, W Lee - US Patent 10,027,688, 2018 - Google Patents
A method and system of detecting a malicious and/or botnet-related domain name,
comprising: reviewing a domain name used in Domain Name System (DNS) traffic in a …
comprising: reviewing a domain name used in Domain Name System (DNS) traffic in a …
Method and system for detecting and responding to attacking networks
D Dagon, N Feamster, W Lee, R Edmonds… - US Patent …, 2013 - Google Patents
A system and method for detecting a first network of compromised computers in a second
network of computers, comprising: collecting Domain Name System (DNS) data for the …
network of computers, comprising: collecting Domain Name System (DNS) data for the …
A survey of coordinated attacks and collaborative intrusion detection
Coordinated attacks, such as large-scale stealthy scans, worm outbreaks and distributed
denial-of-service (DDoS) attacks, occur in multiple networks simultaneously. Such attacks …
denial-of-service (DDoS) attacks, occur in multiple networks simultaneously. Such attacks …
Practical attack graph generation for network defense
K Ingols, R Lippmann… - 2006 22nd Annual …, 2006 - ieeexplore.ieee.org
Attack graphs are a valuable tool to network defenders, illustrating paths an attacker can use
to gain access to a targeted network. Defenders can then focus their efforts on patching the …
to gain access to a targeted network. Defenders can then focus their efforts on patching the …
A systematic survey on multi-step attack detection
Since the beginning of the Internet, cyberattacks have threatened users and organisations.
They have become more complex concurrently with computer networks. Nowadays …
They have become more complex concurrently with computer networks. Nowadays …