Darknet as a source of cyber intelligence: Survey, taxonomy, and characterization
Today, the Internet security community largely emphasizes cyberspace monitoring for the
purpose of generating cyber intelligence. In this paper, we present a survey on darknet. The …
purpose of generating cyber intelligence. In this paper, we present a survey on darknet. The …
A multi-vocal review of security orchestration
Organizations use diverse types of security solutions to prevent cyber-attacks. Multiple
vendors provide security solutions developed using heterogeneous technologies and …
vendors provide security solutions developed using heterogeneous technologies and …
Network flow analysis for detection and mitigation of Fraudulent Resource Consumption (FRC) attacks in multimedia cloud computing
K Bhushan, BB Gupta - Multimedia Tools and Applications, 2019 - Springer
Multimedia computing has evolved as a remarkable technology which provides services to
view, create, edit, process, and search multimedia contents. All these multimedia services …
view, create, edit, process, and search multimedia contents. All these multimedia services …
Benford's law behavior of Internet traffic
L Arshadi, AH Jahangir - Journal of Network and Computer Applications, 2014 - Elsevier
In this paper, we analyze the Internet traffic from a different point of view based on Benford's
law, an empirical law that describes the distribution of leading digits in a collection of …
law, an empirical law that describes the distribution of leading digits in a collection of …
Architecture-centric support for integrating security tools in a security orchestration platform
Abstract Security Operation Centers (SOC) leverage a number of tools to detect, thwart and
deal with security attacks. One of the key challenges of SOC is to quickly integrate security …
deal with security attacks. One of the key challenges of SOC is to quickly integrate security …
Automated interpretation and integration of security tools using semantic knowledge
A security orchestration platform aims at integrating the activities performed by multi-vendor
security tools to streamline the required incident response process. To make such a platform …
security tools to streamline the required incident response process. To make such a platform …
An ontology-driven approach to automating the process of integrating security software systems
A wide variety of security software systems need to be integrated into a Security
Orchestration Platform (SecOrP) to streamline the processes of defending against and …
Orchestration Platform (SecOrP) to streamline the processes of defending against and …
A novel approach to defend multimedia flash crowd in cloud environment
K Bhushan, BB Gupta - Multimedia Tools and applications, 2018 - Springer
Cloud computing is an intelligent integration of distributed computing, hardware
virtualization techniques, automated data center techniques and Internet technologies. Due …
virtualization techniques, automated data center techniques and Internet technologies. Due …
Design and Generation of a Set of Declarative APIs for Security Orchestration
The emerging threat landscape causes continuous change in the Incident Response
Process (IRP) and security tools of security orchestration platforms (SOAR). Users of such …
Process (IRP) and security tools of security orchestration platforms (SOAR). Users of such …
[PDF][PDF] Stability Analysis of a SEIQRS Model with Graded Infection Rates for Internet Worms.
F Wang, F Yang, Y Zhang, J Ma - J. Comput., 2014 - Citeseer
Internet worms have drawn a significant attention owing to their enormous threats to the
Internet infrastructure and services. In order to effectively defend against them, this paper …
Internet infrastructure and services. In order to effectively defend against them, this paper …