Darknet as a source of cyber intelligence: Survey, taxonomy, and characterization

C Fachkha, M Debbabi - IEEE Communications Surveys & …, 2015 - ieeexplore.ieee.org
Today, the Internet security community largely emphasizes cyberspace monitoring for the
purpose of generating cyber intelligence. In this paper, we present a survey on darknet. The …

A multi-vocal review of security orchestration

C Islam, MA Babar, S Nepal - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Organizations use diverse types of security solutions to prevent cyber-attacks. Multiple
vendors provide security solutions developed using heterogeneous technologies and …

Network flow analysis for detection and mitigation of Fraudulent Resource Consumption (FRC) attacks in multimedia cloud computing

K Bhushan, BB Gupta - Multimedia Tools and Applications, 2019 - Springer
Multimedia computing has evolved as a remarkable technology which provides services to
view, create, edit, process, and search multimedia contents. All these multimedia services …

Benford's law behavior of Internet traffic

L Arshadi, AH Jahangir - Journal of Network and Computer Applications, 2014 - Elsevier
In this paper, we analyze the Internet traffic from a different point of view based on Benford's
law, an empirical law that describes the distribution of leading digits in a collection of …

Architecture-centric support for integrating security tools in a security orchestration platform

C Islam, MA Babar, S Nepal - … : 14th European Conference, ECSA 2020, L' …, 2020 - Springer
Abstract Security Operation Centers (SOC) leverage a number of tools to detect, thwart and
deal with security attacks. One of the key challenges of SOC is to quickly integrate security …

Automated interpretation and integration of security tools using semantic knowledge

C Islam, MA Babar, S Nepal - … Conference, CAiSE 2019, Rome, Italy, June …, 2019 - Springer
A security orchestration platform aims at integrating the activities performed by multi-vendor
security tools to streamline the required incident response process. To make such a platform …

An ontology-driven approach to automating the process of integrating security software systems

C Islam, MA Babar, S Nepal - 2019 IEEE/ACM International …, 2019 - ieeexplore.ieee.org
A wide variety of security software systems need to be integrated into a Security
Orchestration Platform (SecOrP) to streamline the processes of defending against and …

A novel approach to defend multimedia flash crowd in cloud environment

K Bhushan, BB Gupta - Multimedia Tools and applications, 2018 - Springer
Cloud computing is an intelligent integration of distributed computing, hardware
virtualization techniques, automated data center techniques and Internet technologies. Due …

Design and Generation of a Set of Declarative APIs for Security Orchestration

C Islam, MA Babar, S Nepal - IEEE Transactions on Services …, 2023 - ieeexplore.ieee.org
The emerging threat landscape causes continuous change in the Incident Response
Process (IRP) and security tools of security orchestration platforms (SOAR). Users of such …

[PDF][PDF] Stability Analysis of a SEIQRS Model with Graded Infection Rates for Internet Worms.

F Wang, F Yang, Y Zhang, J Ma - J. Comput., 2014 - Citeseer
Internet worms have drawn a significant attention owing to their enormous threats to the
Internet infrastructure and services. In order to effectively defend against them, this paper …