Filters








82 Hits in 7.2 sec

A Survey of Deep Learning Techniques for Cybersecurity in Mobile Networks

Eva Rodriguez, Beatriz Otero, Norma Gutierrez, Ramon Canal
2021 IEEE Communications Surveys and Tutorials  
First, we provide a detailed overview of DL techniques applied, or with potential applications, to cybersecurity. Then, we review cybersecurity works based on DL.  ...  For each cybersecurity threat or attack, we discuss the challenges for using DL methods. For each contribution, we review the implementation details and the performance of the solution.  ...  ACKNOWLEDGMENTS This work is supported by the Generalitat de Catalunya under grant 2017SGR962 and the DRAC project (001-P-001723).  ... 
doi:10.1109/comst.2021.3086296 fatcat:2svylj3y7vfijnynpnoksdl6oa

A Report on Botnet Detection Techniques for Intrusion Detection Systems

Sathya D
2022 International Journal for Research in Applied Science and Engineering Technology  
The report presents a survey of various techniques of botnet detection models built using several types of machine learning techniques.  ...  The report gives the review on various methodologies involved in Botnet Detection and to identify the best methods involved to understand various dataset.  ...  The Behaviour extractor (BE) extracts and collects the performance information of the System periodically and creates a Behaviour Instance whenever new periodic data gets collected.  ... 
doi:10.22214/ijraset.2022.44253 fatcat:iifsrkznwvbc7dt55aghv3t6li

Recent Progress of Using Knowledge Graph for Cybersecurity

Kai Liu, Fei Wang, Zhaoyun Ding, Sheng Liang, Zhengfei Yu, Yun Zhou
2022 Electronics  
We also give a relevant dataset review and open-source frameworks on the information extraction and knowledge creation job to aid future studies on cybersecurity knowledge graphs.  ...  In this article, we give a quick overview of the cybersecurity knowledge graph's core concepts, schema, and building methodologies.  ...  The current emphasis of cybersecurity research is to extract correlations as well as potential attacks from cyber threat intelligence information.  ... 
doi:10.3390/electronics11152287 fatcat:2iochkwfn5fujf7l6zobietzye

A review of knowledge graph application scenarios in cyber security [article]

Kai Liu, Fei Wang, Zhaoyun Ding, Sheng Liang, Zhengfei Yu, Yun Zhou
2022 arXiv   pre-print
To facilitate future research on cyber security knowledge graphs, we also present a curated collection of datasets and open-source libraries on the knowledge construction and information extraction task  ...  area because of their capabilities in knowledge aggregation, representation, management, and reasoning.  ...  However, existing datasets could not support this task well because of several drawbacks: firstly, most of them are designed for only one information extraction task (i.e., entity extraction) rarely for  ... 
arXiv:2204.04769v1 fatcat:2fkoppbokvfsbojulewbitj2o4

Malware Detection Issues, Challenges, and Future Directions: A Survey

Faitouri A. Aboaoja, Anazida Zainal, Fuad A. Ghaleb, Bander Ali Saleh Al-rimy, Taiseer Abdalla Elfadil Eisa, Asma Abbas Hassan Elnour
2022 Applied Sciences  
The feature extraction method is introduced according to the techniques used instead of the analysis approach. The survey ends with a discussion of the challenges and future research directions.  ...  Moreover, some review papers presented the feature extraction methods as static, dynamic, and hybrid based on the utilized analysis approach and neglected the feature representation methods taxonomy, which  ...  Conflicts of Interest: There is no conflict of interest.  ... 
doi:10.3390/app12178482 fatcat:tp6qd4fisfh3dcljvwebyle26i

EXTRACTOR: Extracting Attack Behavior from Threat Reports [article]

Kiavash Satvat, Rigel Gjomemo, V.N. Venkatakrishnan
2021 arXiv   pre-print
EXTRACTOR makes no strong assumptions about the text and is capable of extracting attack behaviors as provenance graphs from unstructured text.  ...  To address this challenge, we propose a novel approach and tool called EXTRACTOR that allows precise automatic extraction of concise attack behaviors from CTI reports.  ...  Another drawback of utilizing DP in our current problem is that the tags they produce only refer to grammatical relations, such as subject, object etc.  ... 
arXiv:2104.08618v1 fatcat:wjv7puo56ba7hj53kpoagoy5r4

Open Source Intelligence and its Applications in Next Generation Cyber Security - A Literature Review

Yogish Pai U., Krishna Prasad K.
2021 International journal of applied engineering and management letters  
The capability of OSINT for intelligent analysis strengthens tightly integrating machine learning and automated reasoning techniques.  ...  This literature review to familiarize oneself with the domain of research and to establish the credibility of the work. It also aids in the integration and summarization of the subject.  ...  The tools used, the benefits and drawbacks of each method, and their efficiency are all discussed. The associated difficulties are also discussed.  ... 
doi:10.47992/ijaeml.2581.7000.0100 fatcat:23qjlrnxdjbpldxivurywnbxoa

Open Source Intelligence and its Applications in Next Generation Cyber Security - A Literature Review

U. Yogish Pai, K. Krishna Prasad
2021 Zenodo  
The capability of OSINT for intelligent analysis strengthens tightly integrating machine learning and automated reasoning techniques.  ...  This literature review to familiarize oneself with the domain of research and to establish the credibility of the work. It also aids in the integration and summarization of the subject.  ...  [56] 2020 a thorough examination of sentiment analysis methods used in languages other than English The tools employed, their benefits and drawbacks, and the effectiveness of all techniques, as well  ... 
doi:10.5281/zenodo.5171579 fatcat:fp6wodk45zgwtnuxsnnxjnw7oa

Cybersecurity: Past, Present and Future [article]

Shahid Alam
2022 arXiv   pre-print
This book is an effort to introduce the reader to the field of cybersecurity, highlight current issues and challenges, and provide future directions to mitigate or resolve them.  ...  To keep pace with these advancements in cyber technologies there is a need to expand research and develop new cybersecurity methods and tools to secure these domains and environments.  ...  Due to the resource constrained nature of IoTs, the current traditional approaches and methods need to be enhanced and adapted to suite IoTs.  ... 
arXiv:2207.01227v1 fatcat:vfx54hq3ejc7dlfestj6dkstpa

The effect of ISO/IEC 27001 standard over open-source intelligence

Abdallah Qusef, Hamzeh Alkilani
2022 PeerJ Computer Science  
In this article, OSINT (a combination of public information, social engineering, open-source information, and internet information) was examined to define the present situation further, and suggestions  ...  Individuals' data search and analysis abilities are another trend worth following, whether to optimize the productivity of currently accessible OSINT solutions or to create more advanced OSINT solutions  ...  URL gathering utility is a function that can also extract account information for automated forensic purposes.  ... 
doi:10.7717/peerj-cs.810 pmid:35111912 pmcid:PMC8771761 fatcat:rtezmqd5tjh3fcokhok62k7wqi

A Systematic Review of Recommender Systems and Their Applications in Cybersecurity

Aleksandra Pawlicka, Marek Pawlicki, Rafał Kozik, Ryszard S. Choraś
2021 Sensors  
Then, the paper collects and presents the state of the art concerning the use of recommender systems in cybersecurity; both the existing solutions and future ideas are presented.  ...  The contribution of this paper is two-fold: to date, to the best of our knowledge, there has been no work collecting the applications of recommenders for cybersecurity.  ...  Informed Consent Statement: Not applicable. Data Availability Statement: Not applicable. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s21155248 fatcat:dq4bzqur65cyfggglic7o3kvvy

Bot-IMG: A framework for image-based detection of Android botnets using machine learning

Suleiman Y. Yerima, Abul Bashar
2021 2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA)  
In particular, we implement an imagebased detection method using Histogram of Oriented Gradients (HOG) as feature descriptors within the framework, and utilized Autoencoders in conjunction with traditional  ...  In this paper we propose Bot-IMG, a framework for visualization and image-based detection of Android botnets using machine learning.  ...  The research carried out in this paper is supported by the 2021 Cybersecurity research grant from the Cybersecurity Center at Prince Mohammad Bin Fahd University, Al-Khobar, Saudi Arabia.  ... 
doi:10.1109/aiccsa53542.2021.9686850 fatcat:h2qznvyafjbill5746b5i6axzm

Multimodal Classification of Onion Services for Proactive Cyber Threat Intelligence Using Explainable Deep Learning

Harsha Moraliyage, Vidura Sumanasena, Daswin De Silva, Rashmika Nawaratne, Lina Sun, Damminda Alahakoon
2022 IEEE Access  
The dark web has been confronted with a significant increase in the number and variety of onion services of illegitimate and criminal intent.  ...  classify and contextualize the representative features of an onion service.  ...  Collaborative monitoring and sharing of information across cybersecurity agencies are currently the most effective strategy to prevent or minimize cybersecurity threats [9] .  ... 
doi:10.1109/access.2022.3176965 fatcat:dn4l6w5pqnbnzigsuzd46lf6oq

A Review of Mobile Forensic Investigation Process Models

Arafat Al-Dhaqm, Shukor Razak, Richard A. Ikuesan, Victor R. Kebande
2020 IEEE Access  
A total of 100 MFIPMs were reviewed, to present an inclusive and up-to-date background of MFIPMs.  ...  The paper also goes the extra mile to discuss the state of the art of mobile forensic tools, open and future challenges from a generic standpoint.  ...  His current research interests include digital forensics and cybersecurity.  ... 
doi:10.1109/access.2020.3014615 fatcat:gtaqslfyq5hydpn6x3z6zdwjq4

International Journal of Computer Science July 2021

IJCSIS Editor
2021 Zenodo  
CALL FOR PAPERS International Journal of Computer Science and Information Security (IJCSIS) January-December 2021 Issues The topics suggested by this issue can be discussed in term of concepts, surveys  ...  , state of the art, research, standards, implementations, running experiments, applications, and industrial case studies.  ...  " and "informational security," but in fact, cybersecurity is part of the security of information.  ... 
doi:10.5281/zenodo.5543977 fatcat:vxk2ynl3l5bbpcvpda2lt4qef4
« Previous Showing results 1 — 15 out of 82 results