[HTML][HTML] Attacker behaviour forecasting using methods of intelligent data analysis: A comparative review and prospects

E Doynikova, E Novikova, I Kotenko - Information, 2020 - mdpi.com
Early detection of the security incidents and correct forecasting of the attack development is
the basis for the efficient and timely response to cyber threats. The development of the attack …

[HTML][HTML] A comparative analysis of honeypots on different cloud platforms

C Kelly, N Pitropakis, A Mylonas, S McKeown… - Sensors, 2021 - mdpi.com
In 2019, the majority of companies used at least one cloud computing service and it is
expected that by the end of 2021, cloud data centres will process 94% of workloads. The …

[HTML][HTML] Cyber attacker profiling for risk analysis based on machine learning

I Kotenko, E Fedorchenko, E Novikova, A Jha - Sensors, 2023 - mdpi.com
The notion of the attacker profile is often used in risk analysis tasks such as cyber attack
forecasting, security incident investigations and security decision support. The attacker …

Cyber attacker's next action prediction on dynamic real-time behavior model

M Mohammadzad, J Karimpour, F Mahan - Computers and Electrical …, 2024 - Elsevier
This paper addresses the critical need for enhanced threat analysis amid escalating cyber
threats. Recognizing limitations in current network-level Attack Graphs (AGs), including …

Modeling and analyzing attacker behavior in IoT botnet using temporal convolution network (TCN)

F Sadique, S Sengupta - Computers & Security, 2022 - Elsevier
Traditional reactive approach of blacklisting botnets fails to adapt to the rapidly evolving
landscape of cyberattacks. An automated and proactive approach to detect and block botnet …

Real‐time threat assessment based on hidden Markov models

O Theodosiadou, D Chatzakou, T Tsikrika… - Risk …, 2023 - Wiley Online Library
An essential factor toward ensuring the security of individuals and critical infrastructures is
the timely detection of potentially threatening situations. To this end, especially in the law …

Analysis of attacker behavior in compromised hosts during command and control

F Sadique, S Sengupta - ICC 2021-IEEE International …, 2021 - ieeexplore.ieee.org
Traditional reactive approach of blacklisting botnets fails to adapt to the rapidly evolving
landscape of cyberattacks. An automated and proactive approach to detect and block botnet …

IT Intrusion Detection Using Statistical Learning and Testbed Measurements

X Wang, R Stadler - arXiv preprint arXiv:2402.13081, 2024 - arxiv.org
We study automated intrusion detection in an IT infrastructure, specifically the problem of
identifying the start of an attack, the type of attack, and the sequence of actions an attacker …

Attacker attribution via characteristics inference using honeypot data

P Crochelet, C Neal, NB Cuppens… - … Conference on Network …, 2022 - Springer
Increasingly, the computer networks supporting the operations of organizations face a
higher quantity and sophistication of cyber-incidents. Due to the evolving complexity of these …

[HTML][HTML] Построение профиля атакующего на основе анализа сетевого трафика в критических инфраструктурах

ЕВ Федорченко, ЕС Новикова… - … управления, связи и …, 2021 - cyberleninka.ru
Постановка задачи: модель атакующего является одной из ключевых моделей,
применяемых в задачах анализа информационной безопасности, а ее определение …