Detecting and preventing cyber insider threats: A survey

L Liu, O De Vel, QL Han, J Zhang… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Information communications technology systems are facing an increasing number of cyber
security threats, the majority of which are originated by insiders. As insiders reside behind …

Data exfiltration: A review of external attack vectors and countermeasures

F Ullah, M Edwards, R Ramdhany, R Chitchyan… - Journal of Network and …, 2018 - Elsevier
Context One of the main targets of cyber-attacks is data exfiltration, which is the leakage of
sensitive or private data to an unauthorized entity. Data exfiltration can be perpetrated by an …

A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence

D Kiwia, A Dehghantanha, KKR Choo… - Journal of computational …, 2018 - Elsevier
Malware such as banking Trojans are popular with financially-motivated cybercriminals.
Detection of banking Trojans remains a challenging task, due to the constant evolution of …

Survey of approaches and features for the identification of HTTP-based botnet traffic

D Acarali, M Rajarajan, N Komninos… - Journal of network and …, 2016 - Elsevier
Botnet use is on the rise, with a growing number of botmasters now switching to the HTTP-
based C&C infrastructure. This offers them more stealth by allowing them to blend in with …

Decanter: Detection of anomalous outbound http traffic by passive application fingerprinting

R Bortolameotti, T van Ede, M Caselli… - Proceedings of the 33rd …, 2017 - dl.acm.org
We present DECANTeR, a system to detect anomalous outbound HTTP communication,
which passively extracts fingerprints for each application running on a monitored host. The …

A survey of similarities in banking malware behaviours

P Black, I Gondal, R Layton - Computers & Security, 2018 - Elsevier
Banking malware are a class of information stealing malicious software that target the
financial industry. Banking malware families have become persistent with new versions …

Security challenges and cyber forensic ecosystem in IOT driven BYOD environment

MI Ali, S Kaur, A Khamparia, D Gupta, S Kumar… - IEEE …, 2020 - ieeexplore.ieee.org
The usage of Internet of Things (IoT)/Bring Your Own Devices (BYOD) has grown up
exponentially, as expected 50 Billion IoT devices will get connected by the end of 2020 in …

A survey of fast flux botnet detection with fast flux cloud computing

A Al-Nawasrah, AA Almomani, S Atawneh… - International Journal of …, 2020 - igi-global.com
A botnet refers to a set of compromised machines controlled distantly by an attacker. Botnets
are considered the basis of numerous security threats around the world. Command and …

Measuring and mitigating the risk of ip reuse on public clouds

E Pauley, R Sheatsley, B Hoak, Q Burke… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Public clouds provide scalable and cost-efficient computing through resource sharing.
However, moving from traditional on-premises service management to clouds introduces …

[HTML][HTML] A novel privacy preserving user identification approach for network traffic

N Clarke, F Li, S Furnell - computers & security, 2017 - Elsevier
The prevalence of the Internet and cloud-based applications, alongside the technological
evolution of smartphones, tablets and smartwatches, has resulted in users relying upon …