CRUSOE: A toolset for cyber situational awareness and decision support in incident handling

M Husák, L Sadlek, S Špaček, M Laštovička… - Computers & …, 2022 - Elsevier
The growing size and complexity of today's computer network make it hard to achieve and
maintain so-called cyber situational awareness, ie, the ability to perceive and comprehend …

[HTML][HTML] DNS Intrusion Detection (DID)—A SNORT-based solution to detect DNS amplification and DNS tunneling attacks

S Adiwal, B Rajendran, SD Sudarsan - Franklin Open, 2023 - Elsevier
Abstract Domain Name System (DNS) plays a critical role in the Internet ecosystem,
translating numerical IP addresses to memorable domain names and vice versa. The …

A word-level analytical approach for identifying malicious domain names caused by dictionary-based DGA malware

A Satoh, Y Fukuda, G Kitagata, Y Nakamura - Electronics, 2021 - mdpi.com
Computer networks are facing serious threats from the emergence of malware with
sophisticated DGAs (Domain Generation Algorithms). This type of DGA malware …

A cause-based classification approach for malicious DNS queries detected through blacklists

A Satoh, Y Nakamura, Y Fukuda, K Sasai… - IEEE …, 2019 - ieeexplore.ieee.org
Some of the most serious security threats facing computer networks involve malware. To
prevent this threat, administrators need to swiftly remove the infected machines from their …

A superficial analysis approach for identifying malicious domain names generated by DGA malware

A Satoh, Y Fukuda, T Hayashi… - IEEE Open Journal of …, 2020 - ieeexplore.ieee.org
Some of the most serious security threats facing computer networks involve malware. To
prevent malware-related damage, administrators must swiftly identify and remove the …

Domain-Checker: A Classification of Malicious and Benign Domains Using Multitier Filtering

APS Bhadauria, M Singh - SN Computer Science, 2023 - Springer
The loopholes of Internet are exploited by cyber-attackers to forward spam, commit fiscal
frauds, execute phishing, wallow in command-and-control, spread malware, and other …

DNS firewall data visualization

S Špaček, V Rusňák… - 2019 IFIP/IEEE …, 2019 - ieeexplore.ieee.org
Common security tools generate a lot of data suitable for further analysis. However, the raw
form of the data is often too complex and useful information gets lost in a large volume of …

Performance and efficacy of Snort versus Suricata in intrusion detection: A benchmark analysis

DS Ghazi, HS Hamid, MJ Zaiter… - AIP Conference …, 2024 - pubs.aip.org
This study conducts an empirical analysis to compare the performance of two prominent
network intrusion detection systems (NIDS), Snort and Suricata. The analysis focuses on …

Data Protection and Security Issues With Network Error Logging

L Polčák, K Jeřábek - arXiv preprint arXiv:2305.05343, 2023 - arxiv.org
Network Error Logging helps web server operators detect operational problems in real-time
to provide fast and reliable services. This paper analyses Network Error Logging from two …

Malicious Traffic Blocking Mechanism and Protection Based on DNS

RJ Hung, CC Hsu, JH Ho - 2023 IEEE 5th Eurasia Conference …, 2023 - ieeexplore.ieee.org
We implemented the “Domain Intelligence Joint Defense System (DIPDS)” to detect and
block malicious domains. By integrating the information provided by internal and external …