Unraveling Threat Intelligence Through the Lens of Malicious URL Campaigns
Abstract
References
Index Terms
- Unraveling Threat Intelligence Through the Lens of Malicious URL Campaigns
Recommendations
Malicious Behavior Detection using Windows Audit Logs
AISec '15: Proceedings of the 8th ACM Workshop on Artificial Intelligence and SecurityAs antivirus and network intrusion detection systems have increasingly proven insufficient to detect advanced threats, large security operations centers have moved to deploy endpoint-based sensors that provide deeper visibility into low-level events ...
The challenge of detecting sophisticated attacks: Insights from SOC Analysts
ARES '18: Proceedings of the 13th International Conference on Availability, Reliability and SecurityThe ever-increasing rate of sophisticated cyber-attacks and its subsequent impact on networks has remained a menace to the security community. Existing network security solutions, including those applying machine learning algorithms, often centre their ...
ATLAS: A Practical Attack Detection and Live Malware Analysis System for IoT Threat Intelligence
Information SecurityAbstractRecently, malware targeting IoT devices has become more prevalent. In this paper, we propose a practical ATtack detection and Live malware Analysis System (ATLAS) that provides up-to-date threat intelligence for IoT. ATLAS consists of a hybrid IoT ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 69Total Downloads
- Downloads (Last 12 months)69
- Downloads (Last 6 weeks)1
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format