Thirty years of DNS insecurity: Current issues and perspectives
G Schmid - IEEE Communications Surveys & Tutorials, 2021 - ieeexplore.ieee.org
When DNS was created, nobody expected that it would have become the base for the digital
economy and a prime target for cybercriminals. And nobody expected that one main asset of …
economy and a prime target for cybercriminals. And nobody expected that one main asset of …
Advances in artificial intelligence for detecting algorithmically generated domains: Current trends and future prospects
H Alqahtani, G Kumar - Engineering Applications of Artificial Intelligence, 2024 - Elsevier
This comprehensive review navigates the complex domain of Domain Generation
Algorithms (DGAs) and their detection using Artificial Intelligence (AI), revealing both …
Algorithms (DGAs) and their detection using Artificial Intelligence (AI), revealing both …
Detection of DGA-generated domain names with TF-IDF
H Vranken, H Alizadeh - Electronics, 2022 - mdpi.com
Botnets often apply domain name generation algorithms (DGAs) to evade detection by
generating large numbers of pseudo-random domain names of which only few are …
generating large numbers of pseudo-random domain names of which only few are …
Early detection of ransomware activity based on hardware performance counters
Modern-day ransomware variants are quick in their operations and start to encrypt the files
within a few seconds after the initial payload execution. This poses an exigency towards …
within a few seconds after the initial payload execution. This poses an exigency towards …
HiPeR-Early detection of a ransomware attack using hardware performance counters
Ransomware has been one of the most prevalent forms of malware over the previous
decade, and it continues to be one of the most significant threats today. Recently …
decade, and it continues to be one of the most significant threats today. Recently …
A comprehensive API call analysis for detecting Windows-based ransomware
PM Anand, PVS Charan… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Ransomware has been one of the prevalent malware for the past decade, and it is
continuing to be one of the significant threats today. The API call-based analysis is a widely …
continuing to be one of the significant threats today. The API call-based analysis is a widely …
Intercepting hail hydra: Real-time detection of algorithmically generated domains
A crucial technical challenge for cybercriminals is to keep control over the potentially
millions of infected devices that build up their botnets, without compromising the robustness …
millions of infected devices that build up their botnets, without compromising the robustness …
A multi class classification for detection of IoT botnet malware
Botnets are one of the most prevailing threats for cyber-physical devices around the world.
The evolution of botnet attacks has been rampant and diverse with vast scalability. One of …
The evolution of botnet attacks has been rampant and diverse with vast scalability. One of …
[HTML][HTML] Identifying malicious accounts in blockchains using domain names and associated temporal properties
The rise in the adoption of blockchain technology has led to increased illegal activities by
cybercriminals costing billions of dollars. Many machine learning algorithms are applied to …
cybercriminals costing billions of dollars. Many machine learning algorithms are applied to …
Dmapt: Study of data mining and machine learning techniques in advanced persistent threat attribution and detection
PVS Charan, PM Anand… - Data Mining-Concepts and …, 2021 - books.google.com
Modern-day malware is intelligent enough to hide its presence and perform stealthy
operations in the background. Advance Persistent Threat (APT) is one such kind of malware …
operations in the background. Advance Persistent Threat (APT) is one such kind of malware …