Thirty years of DNS insecurity: Current issues and perspectives

G Schmid - IEEE Communications Surveys & Tutorials, 2021 - ieeexplore.ieee.org
When DNS was created, nobody expected that it would have become the base for the digital
economy and a prime target for cybercriminals. And nobody expected that one main asset of …

Advances in artificial intelligence for detecting algorithmically generated domains: Current trends and future prospects

H Alqahtani, G Kumar - Engineering Applications of Artificial Intelligence, 2024 - Elsevier
This comprehensive review navigates the complex domain of Domain Generation
Algorithms (DGAs) and their detection using Artificial Intelligence (AI), revealing both …

Detection of DGA-generated domain names with TF-IDF

H Vranken, H Alizadeh - Electronics, 2022 - mdpi.com
Botnets often apply domain name generation algorithms (DGAs) to evade detection by
generating large numbers of pseudo-random domain names of which only few are …

Early detection of ransomware activity based on hardware performance counters

MA Putrevu, VSC Putrevu, SK Shukla - Proceedings of the 2023 …, 2023 - dl.acm.org
Modern-day ransomware variants are quick in their operations and start to encrypt the files
within a few seconds after the initial payload execution. This poses an exigency towards …

HiPeR-Early detection of a ransomware attack using hardware performance counters

PM Anand, PVS Charan, SK Shukla - Digital Threats: Research and …, 2023 - dl.acm.org
Ransomware has been one of the most prevalent forms of malware over the previous
decade, and it continues to be one of the most significant threats today. Recently …

A comprehensive API call analysis for detecting Windows-based ransomware

PM Anand, PVS Charan… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Ransomware has been one of the prevalent malware for the past decade, and it is
continuing to be one of the significant threats today. The API call-based analysis is a widely …

Intercepting hail hydra: Real-time detection of algorithmically generated domains

F Casino, N Lykousas, I Homoliak, C Patsakis… - Journal of Network and …, 2021 - Elsevier
A crucial technical challenge for cybercriminals is to keep control over the potentially
millions of infected devices that build up their botnets, without compromising the robustness …

A multi class classification for detection of IoT botnet malware

H Chunduri, T Gireesh Kumar, PVS Charan - International conference on …, 2021 - Springer
Botnets are one of the most prevailing threats for cyber-physical devices around the world.
The evolution of botnet attacks has been rampant and diverse with vast scalability. One of …

[HTML][HTML] Identifying malicious accounts in blockchains using domain names and associated temporal properties

RK Sachan, R Agarwal, SK Shukla - Blockchain: Research and …, 2023 - Elsevier
The rise in the adoption of blockchain technology has led to increased illegal activities by
cybercriminals costing billions of dollars. Many machine learning algorithms are applied to …

Dmapt: Study of data mining and machine learning techniques in advanced persistent threat attribution and detection

PVS Charan, PM Anand… - Data Mining-Concepts and …, 2021 - books.google.com
Modern-day malware is intelligent enough to hide its presence and perform stealthy
operations in the background. Advance Persistent Threat (APT) is one such kind of malware …