[HTML][HTML] Two decades of cyberattack simulations: A systematic literature review
V Engström, R Lagerström - Computers & Security, 2022 - Elsevier
Cyberattack simulations appear across multiple computer security domains and are
interpreted in many different but equally viable ways. However, this makes the topic appear …
interpreted in many different but equally viable ways. However, this makes the topic appear …
Puppetnets: Misusing web browsers as a distributed attack infrastructure
VT Lam, S Antonatos, P Akritidis… - Proceedings of the 13th …, 2006 - dl.acm.org
Most of the recent work on Web security focuses on preventing attacks that directly harm the
browser's host machine and user. In this paper we attempt to quantify the threat of browsers …
browser's host machine and user. In this paper we attempt to quantify the threat of browsers …
Puppetnets: Misusing web browsers as a distributed attack infrastructure
S Antonatos, P Akritidis, VT Lam… - ACM Transactions on …, 2008 - dl.acm.org
Most of the recent work on Web security focuses on preventing attacks that directly harm the
browser's host machine and user. In this paper we attempt to quantify the threat of browsers …
browser's host machine and user. In this paper we attempt to quantify the threat of browsers …
Detecting stealthy malware using behavioral features in network traffic
TF Yen - 2011 - search.proquest.com
It is clearly in the interest of network administrators to detect hosts within their networks that
are infiltrated by stealthy malware. Infected hosts (also called bots) can exfiltrate sensitive …
are infiltrated by stealthy malware. Infected hosts (also called bots) can exfiltrate sensitive …
[图书][B] Framework for botnet emulation and analysis
CP Lee - 2009 - search.proquest.com
Criminals use the anonymity and pervasiveness of the Internet to commit fraud, extortion,
and theft. Botnets are used as the primary tool for this criminal activity. Botnets allow …
and theft. Botnets are used as the primary tool for this criminal activity. Botnets allow …
Towards practical framework for collecting and analyzing network-centric attacks
N Paxton, GJ Ahn, B Chu - 2007 IEEE International Conference …, 2007 - ieeexplore.ieee.org
Since nearly the beginning of the Internet, malware has been a significant deterrent to
productivity for end-users, both personal and business related. A particular malware, known …
productivity for end-users, both personal and business related. A particular malware, known …
Revisiting botnet models and their implications for takedown strategies
Several works have utilized network models to study peer-to-peer botnets, particularly in
evaluating the effectiveness of strategies aimed at taking down a botnet. We observe that …
evaluating the effectiveness of strategies aimed at taking down a botnet. We observe that …
[PDF][PDF] Combining statistical network data, probabilistic neural networks and the computational power of GPUs for anomaly detection in computer networks
S Bastke, M Deml, S Schmidt - 1st Workshop on Intelligent Security …, 2009 - Citeseer
To improve anomaly detection in fast computer networks we analyze the usage of Graphics
Processing Units (GPU) to detect attacks and threats. We operate on statistical network data …
Processing Units (GPU) to detect attacks and threats. We operate on statistical network data …
动态自组织P2P 僵尸网络的构建及其防御
赵昊, 舒辉, 刘潮歌, 邢颖, 赵耘田 - Journal of Cyber Security, 2023 - jcs.iie.ac.cn
僵尸网络作为大规模攻击活动的基础平台, 严重威胁网络空间安全, 从预测的角度对其开展研究
具有重要的现实意义. 针对现有研究在终端感知, 身份识别和动态对抗中存在的不足 …
具有重要的现实意义. 针对现有研究在终端感知, 身份识别和动态对抗中存在的不足 …