A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Mobile Botnet Detection Model based on Retrospective Pattern Recognition
2016
International Journal of Security and Its Applications
This paper proposes a Neural Network based model to detect mobile HTTP Botnets with random intervals independent of the packet payload, commands content, and encryption complexity of Bot communications ...
The dynamic nature of Botnets along with their sophisticated characteristics makes them one of the biggest threats to cyber security. ...
Acknowledgments The authors would like to acknowledge the Ministry of Higher Education (MOHE) for providing the grant 600-RMI/FRGS 5/3 (141/2015) in carrying out this research work and to the Institute ...
doi:10.14257/ijsia.2016.10.9.05
fatcat:p4texv7vi5hzbbxdrpx5jd2p6q
Security Information and Event Management (SIEM): Analysis, Trends, and Usage in Critical Infrastructures
2021
Sensors
A list of potential enhancements for the next generation of SIEMs is provided as part of the review of existing solutions as well as an analysis on their benefits and usage in critical infrastructures. ...
Security Information and Event Management (SIEM) systems have been widely deployed as a powerful tool to prevent, detect, and react against cyber-attacks. ...
Mironescu, Frances Buontempo, Ilir Gashi, Ivo Rosa, and the rest of partners from the DiSIEM project for their support, hard work, and collaboration. ...
doi:10.3390/s21144759
fatcat:h3fgqiuymrgzjflwujd5sphde4
ARANAC: A Bring-Your-Own-Permissions Network Access Control Methodology for Android Devices
2021
IEEE Access
In this paper, we introduce a new methodology for network access control for Android devices based on app risk assessment. ...
The access control scheme combines three operational modules: i) a device monitoring tool, ii) a novel permission-based risk model, and iii) an anomaly-based detection machine learning module based on ...
Then the proposed model uses smart contracts to provide adaptive features in which the user behavior is monitored to detect any abnormal actions from authorized users. ...
doi:10.1109/access.2021.3097152
fatcat:dswbpghrzzd77ih327jatkncsu
A Review of Insider Threat Detection Approaches with IoT Perspective
2020
IEEE Access
In this work, we provide a generalization of aspects of insider threats with IoT and analyze the surveyed literature based on both private and public sources. ...
Attack surfaces are significantly enlarged which could cause a severe risk in terms of company insider threat management. ...
ACKNOWLEDGMENT This article was presented in part at the MobiSec 2019 (The 4th International Symposium on Mobile Internet Security). ...
doi:10.1109/access.2020.2990195
fatcat:uxydn6lk4vdi5mtqaotp35s3oq
Cyber Security in the Mobile Age
[chapter]
2014
Platform Embedded Security Technology Revealed
A bug will be recorded when the behavior of the system under test violates one or more requirements. ...
They are designed to detect changes in platform state and identify malicious programs on the system. ...
doi:10.1007/978-1-4302-6572-6_1
fatcat:app7gkjwezcibnum2245bvonze
Toward Engineering a Secure Android Ecosystem
2016
ACM Computing Surveys
Based on our collection of knowledge, we envision a blueprint for engineering a secure, next-generation Android ecosystem. ...
The openness and extensibility of Android have made it a popular platform for mobile devices and a strong candidate to drive the Internet-of-Things. ...
Abnormal behavior detection using sequences of system calls has been successfully applied on the intrusion detection domain, as the sequence of system calls executed by the program is a good indicator ...
doi:10.1145/2963145
fatcat:d5vhxpdywrevvbh4as6vvt576q
Software as a Service: Analyzing Security Issues
[article]
2015
arXiv
pre-print
Finally, possible solutions or techniques which can be applied in tandem are presented for a secure SaaS platform. ...
Software-as-a-service (SaaS) is a type of software service delivery model which encompasses a broad range of business opportunities and challenges. ...
Behavior-based and biometric character-based authentication Gait based authentication [28] Implicit authentication based on touch screen pattern [29] Implicit authentication based on user behavior ...
arXiv:1505.01711v1
fatcat:pnwkovzsd5hqrpcmh6dakmi7xi
A New Security Architecture to Improve Business Agility
[chapter]
2013
Managing Risk and Information Security
For example, if traffic within a server cluster becomes abnormally high, it might indicate that a botnet is exploiting one of the servers to broadcast traffic across the web. ...
This helps us accommodate usage models such as bring-your-own-device (BYOD). ...
doi:10.1007/978-1-4302-5114-9_7
fatcat:pzfrluckk5efhnl5uhrknh4uay
Insider Threats
[chapter]
2010
Encyclopedia of Information Assurance
In this paper, we present the concept of "Ben-ware" as a beneficial software system capable of identifying anomalous human behaviour within a 'closed' organisation's IT infrastructure. ...
Ben-ware has been developed as a distributed system comprising of probes for data collection, intermediate nodes for data routing and higher nodes for data analysis. ...
However, in both of these cases, the number of files stolen is two per day (with Bad3 increasing by one per day), thus the system is sensitive to small variations in usage patterns. ...
doi:10.1081/e-eia-120046552
fatcat:jqc3bun5j5fs3arzneg4ilreoq
Experimental Cyber Attack Detection Framework
2021
Electronics
We submit a novel concept for integrating machine learning and analytical tools into a live intrusion detection and prevention solution. ...
The results are promising and show the benefits of such a tool in the early prevention stages of both known and unknown cyber-attack patterns. ...
Gheorghit ,ȃ is a system and network engineer at the "Gheorghe Asachi" Technical University of Iasi, Romania. ...
doi:10.3390/electronics10141682
fatcat:h4tpj4ihkvfanhn6fpmwkjwqjy
A Survey on Threat Situation Awareness Systems: Framework, Techniques, and Insights
[article]
2021
arXiv
pre-print
This paper provides a comprehensive study on the current state-of-the-art in the cyber SA to discuss the following aspects of SA: key design principles, framework, classifications, data collection, and ...
Cyberspace is full of uncertainty in terms of advanced and sophisticated cyber threats which are equipped with novel approaches to learn the system and propagate themselves, such as AI-powered threats. ...
MBIE) of New Zealand as a part of the Catalyst Strategy Funds under Grant MAUX1912. ...
arXiv:2110.15747v1
fatcat:zboddcg4a5gdxmq5hqmo5cpj34
A Survey on Cyber Situation Awareness Systems: Framework, Techniques, and Insights
2022
ACM Computing Surveys
This paper provides a comprehensive study on the current state-of-the-art in the cyber SA to discuss the following aspects of SA: key design principles, framework, classifications, data collection, analysis ...
Cyberspace is full of uncertainty in terms of advanced and sophisticated cyber threats which are equipped with novel approaches to learn the system and propagate themselves, such as AI-powered threats. ...
MBIE) of New Zealand as a part of the Catalyst Strategy Funds under Grant MAUX1912. ...
doi:10.1145/3530809
fatcat:cwk5bp56ere5re2frzgzox56ka
Security issues in cloud environments: a survey
2013
International Journal of Information Security
This paper surveys the works on cloud security issues, making a comprehensive review of the literature on the subject. ...
In the last few years, the appealing features of cloud computing have been fueling the integration of cloud environments in the industry, which has been consequently motivating the research on related ...
Acknowledgements We would like to thank all the anonymous reviewers for constructively criticizing this work. ...
doi:10.1007/s10207-013-0208-7
fatcat:55o67epb6zfspchxuzvuduzr4a
Insider Threats
2015
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats - MIST '15
In this paper, we present the concept of "Ben-ware" as a beneficial software system capable of identifying anomalous human behaviour within a 'closed' organisation's IT infrastructure. ...
Ben-ware has been developed as a distributed system comprising of probes for data collection, intermediate nodes for data routing and higher nodes for data analysis. ...
However, in both of these cases, the number of files stolen is two per day (with Bad3 increasing by one per day), thus the system is sensitive to small variations in usage patterns. ...
doi:10.1145/2808783.2808785
dblp:conf/ccs/McGoughWBTRAGFM15
fatcat:s22b5rffbzhafbg3562d2fd5wy
Evaluation of Security Solutions for Android Systems
[article]
2015
arXiv
pre-print
Since the Android operating system has the highest market share today, we decided to focus on it in this study in which we review some of the state-of-the-art security solutions for Android-based smartphones ...
In addition, we present a set of evaluation criteria aiming at evaluating security mechanisms that are specifically designed for Android-based smartphones. ...
Intrusion Detection System Intrusion detection systems (IDS) monitor the device, applications, or user's behavior to detect/prevent abnormal or known malicious behavior. ...
arXiv:1502.04870v1
fatcat:uubl4boopjaapnxbfvfqnbnoe4
« Previous
Showing results 1 — 15 out of 58 results