Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleOctober 2024
A robust statistical framework for cyber-vulnerability prioritisation under partial information in threat intelligence
Expert Systems with Applications: An International Journal (EXWA), Volume 255, Issue PBhttps://doi.org/10.1016/j.eswa.2024.124572AbstractProactive cyber-risk assessment is gaining momentum due to the wide range of sectors that can benefit from the prevention of cyber-incidents by preserving integrity, confidentiality, and the availability of data. The rising attention to ...
Highlights- We propose a flexible statistical approach to handle uncertainty in cyber-risk.
- Robust mid-quantile regression is applied to predict cyber-vulnerabilities impact.
- A novel accuracy index is introduced to take into account unknown ...
- research-articleNovember 2024
LLM-TIKG: Threat intelligence knowledge graph construction utilizing large language model
AbstractOpen-source threat intelligence is often unstructured and cannot be directly applied to the next detection and defense. By constructing a knowledge graph through open-source threat intelligence, we can better apply this information to intrusion ...
- research-articleNovember 2024
SQL injection attack: Detection, prioritization & prevention
Journal of Information Security and Applications (JISA), Volume 85, Issue Chttps://doi.org/10.1016/j.jisa.2024.103871AbstractWeb applications have become central in the digital landscape, providing users instant access to information and allowing businesses to expand their reach. Injection attacks, such as SQL injection (SQLi), are prominent attacks on web applications,...
- research-articleJuly 2024
A Big Data architecture for early identification and categorization of dark web sites
Future Generation Computer Systems (FGCS), Volume 157, Issue CPages 67–81https://doi.org/10.1016/j.future.2024.03.025AbstractThe dark web has become notorious for its association with illicit activities and there is a growing need for systems to automate the monitoring of this space. This paper proposes an end-to-end scalable architecture for the continuous early ...
Highlights- Developed an Open Source Big Data architecture for analyzing Tor onion services.
- Used near real-time ingestion to extract onion addresses from four types of sources.
- Deployed a daily batch pipeline to preprocess, deduplicate and ...
- research-articleJuly 2024
A Span-based Multivariate Information-aware Embedding Network for joint relational triplet extraction of threat intelligence
AbstractThe extraction of relational triplets in threat intelligence is a critical aspect of constructing a knowledge graph. However, the field encounters challenges like high semantic similarity among entities, limited relevance of entities, and a heavy ...
-
- research-articleMay 2024
Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle
International Journal of Information Security (IJOIS), Volume 23, Issue 4Pages 2691–2710https://doi.org/10.1007/s10207-024-00860-wAbstractThe escalating complexity and impact of cyber threats require organisations to rehearse responses to cyber-attacks by routinely conducting cyber security exercises. However, the effectiveness of these exercises is limited by the exercise planners’ ...
- research-articleDecember 2023
Unraveling Threat Intelligence Through the Lens of Malicious URL Campaigns
- Mahathir Almashor,
- Ejaz Ahmed,
- Benjamin Pick,
- Jason Xue,
- Sharif Abuadbba,
- Raj Gaire,
- Shuo Wang,
- Seyit Camtepe,
- Surya Nepal
AINTEC '23: Proceedings of the 18th Asian Internet Engineering ConferencePages 78–86https://doi.org/10.1145/3630590.3630600The daily deluge of alerts is a sombre reality for Security Operations Centre (SOC) personnel worldwide. Those on the front-lines of cybersecurity face the unenviable task of prioritising threats amongst a flood of URLs found within malicious ...
- review-articleNovember 2023
A survey of contemporary open-source honeypots, frameworks, and tools
Journal of Network and Computer Applications (JNCA), Volume 220, Issue Chttps://doi.org/10.1016/j.jnca.2023.103737AbstractAutomated attacks allow adversaries to exploit vulnerabilities in enterprise IT systems at short notice. To identify such attacks as well as new cybersecurity threats, defenders use honeypot systems; these monitored decoy resources mimic ...
- research-articleOctober 2023
Attack scenario reconstruction via fusing heterogeneous threat intelligence
AbstractNowadays, new-generation threats often use multiple means or perform several steps to intrude into networks and ultimately reach their objective. These new threats have multi-staged, and we can understand their intrusion pattern from ...
- research-articleSeptember 2023
A framework for threat intelligence extraction and fusion
AbstractCyber-attacks, with various emerging attack techniques, are becoming increasingly sophisticated and difficult to deal with, posing great threats to companies and every individual. Therefore, analyzing attack incidents and tracing the attack ...
- research-articleSeptember 2023
DKaaS: DARK-KERNEL as a service for active cyber threat intelligence
AbstractCyber Threat Intelligence(CTI) plays an indispensable role in providing evidence-based knowledge to plan defensive strategies against advanced cyber attacks. Most threat intelligence data originate from security researchers, vendor blogs, list of ...
- ArticleJuly 2023
A Peer to Peer Federated Graph Neural Network for Threat Intelligence
AbstractThreat intelligence is the process of collecting and analyzing information about potential cyber threats. Several approaches have been conducted for cyber threat detection based on the federated learning method. These approaches aim to establish a ...
- research-articleApril 2023
S.U.S. You’re SUS!—Identifying influencer hackers on dark web social networks
Computers and Electrical Engineering (CENG), Volume 107, Issue Chttps://doi.org/10.1016/j.compeleceng.2023.108627AbstractDark web is an obscured part of the Internet, specifically used for sharing exploits, data breaches, and other means of cybercrime. Dark web forums provide opportunities to share such data and exploits and assign user reputation and ...
- research-articleMarch 2023
APTHunter: Detecting Advanced Persistent Threats in Early Stages
Digital Threats: Research and Practice (DTRAP), Volume 4, Issue 1Article No.: 11, Pages 1–31https://doi.org/10.1145/3559768We propose APTHunter, a system for prompt detection of Advanced and Persistent Threats (APTs) in early stages. We provide an approach for representing the indicators of compromise that appear in the cyber threat intelligence reports and the relationships ...
- research-articleOctober 2022
Advanced Persistent Threat intelligent profiling technique: A survey
Computers and Electrical Engineering (CENG), Volume 103, Issue Chttps://doi.org/10.1016/j.compeleceng.2022.108261AbstractWith the boom in Internet and information technology, cyber-attacks are becoming more frequent and sophisticated, especially Advanced Persistent Threat (APT) attacks. Unlike traditional attacks, APT attacks are more targeted, stealthy, ...
Graphical abstractDisplay Omitted
Highlights- The first review paper on intelligent threat profiling of Advanced Persistent Threat.
- research-articleSeptember 2022
Architecting threat hunting system based on the DODAF framework
The Journal of Supercomputing (JSCO), Volume 79, Issue 4Pages 4215–4242https://doi.org/10.1007/s11227-022-04808-6AbstractThe importance of large data analytic systems for cyber security is expanding. Thus, collecting systematically, thoroughly assessing, and synthesizing the literature on architectural techniques for developing such systems is critical. There is a ...
- research-articleSeptember 2022
An integrated cyber security risk management framework and risk predication for the critical infrastructure protection
Neural Computing and Applications (NCAA), Volume 34, Issue 18Pages 15241–15271https://doi.org/10.1007/s00521-022-06959-2AbstractCyber security risk management plays an important role for today’s businesses due to the rapidly changing threat landscape and the existence of evolving sophisticated cyber attacks. It is necessary for organisations, of any size, but in particular ...
- research-articleJuly 2022
Faking smart industry: exploring cyber-threat landscape deploying cloud-based honeypot
Wireless Networks (WIRE), Volume 30, Issue 5Pages 4527–4541https://doi.org/10.1007/s11276-022-03057-yAbstractThe digital evolution of Industry 4.0 enabled Operational Technology infrastructures to operate and remotely maintain cyber-physical systems bridging over IP communications. It has also expanded new attack surfaces and steadily increased the ...