Detecting and preventing cyber insider threats: A survey
Information communications technology systems are facing an increasing number of cyber
security threats, the majority of which are originated by insiders. As insiders reside behind …
security threats, the majority of which are originated by insiders. As insiders reside behind …
Data exfiltration: A review of external attack vectors and countermeasures
Context One of the main targets of cyber-attacks is data exfiltration, which is the leakage of
sensitive or private data to an unauthorized entity. Data exfiltration can be perpetrated by an …
sensitive or private data to an unauthorized entity. Data exfiltration can be perpetrated by an …
A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence
D Kiwia, A Dehghantanha, KKR Choo… - Journal of computational …, 2018 - Elsevier
Malware such as banking Trojans are popular with financially-motivated cybercriminals.
Detection of banking Trojans remains a challenging task, due to the constant evolution of …
Detection of banking Trojans remains a challenging task, due to the constant evolution of …
Survey of approaches and features for the identification of HTTP-based botnet traffic
D Acarali, M Rajarajan, N Komninos… - Journal of network and …, 2016 - Elsevier
Botnet use is on the rise, with a growing number of botmasters now switching to the HTTP-
based C&C infrastructure. This offers them more stealth by allowing them to blend in with …
based C&C infrastructure. This offers them more stealth by allowing them to blend in with …
Decanter: Detection of anomalous outbound http traffic by passive application fingerprinting
We present DECANTeR, a system to detect anomalous outbound HTTP communication,
which passively extracts fingerprints for each application running on a monitored host. The …
which passively extracts fingerprints for each application running on a monitored host. The …
A survey of similarities in banking malware behaviours
Banking malware are a class of information stealing malicious software that target the
financial industry. Banking malware families have become persistent with new versions …
financial industry. Banking malware families have become persistent with new versions …
Security challenges and cyber forensic ecosystem in IOT driven BYOD environment
The usage of Internet of Things (IoT)/Bring Your Own Devices (BYOD) has grown up
exponentially, as expected 50 Billion IoT devices will get connected by the end of 2020 in …
exponentially, as expected 50 Billion IoT devices will get connected by the end of 2020 in …
A survey of fast flux botnet detection with fast flux cloud computing
A botnet refers to a set of compromised machines controlled distantly by an attacker. Botnets
are considered the basis of numerous security threats around the world. Command and …
are considered the basis of numerous security threats around the world. Command and …
Measuring and mitigating the risk of ip reuse on public clouds
Public clouds provide scalable and cost-efficient computing through resource sharing.
However, moving from traditional on-premises service management to clouds introduces …
However, moving from traditional on-premises service management to clouds introduces …
[HTML][HTML] A novel privacy preserving user identification approach for network traffic
The prevalence of the Internet and cloud-based applications, alongside the technological
evolution of smartphones, tablets and smartwatches, has resulted in users relying upon …
evolution of smartphones, tablets and smartwatches, has resulted in users relying upon …