Darknet as a source of cyber intelligence: Survey, taxonomy, and characterization

C Fachkha, M Debbabi - IEEE Communications Surveys & …, 2015 - ieeexplore.ieee.org
Today, the Internet security community largely emphasizes cyberspace monitoring for the
purpose of generating cyber intelligence. In this paper, we present a survey on darknet. The …

IoTPOT: A novel honeypot for revealing current IoT threats

YMP Pa, S Suzuki, K Yoshioka… - Journal of Information …, 2016 - jstage.jst.go.jp
We analyze the increasing threats against IoT devices. We show that Telnet-based attacks
that target IoT devices have rocketed since 2014. Based on this observation, we propose an …

Adaptive observation of emerging cyber attacks targeting various IoT devices

S Kato, R Tanabe, K Yoshioka… - 2021 IFIP/IEEE …, 2021 - ieeexplore.ieee.org
For years, honeypots have been a valuable tool for observing cyber attacks. But in the age of
Internet-of-Things (IoT), where various kinds of devices are being connected to the Internet …

DKaaS: DARK-KERNEL as a service for active cyber threat intelligence

PVS Charan, G Ratnakaram, H Chunduri… - Computers & …, 2023 - Elsevier
Abstract Cyber Threat Intelligence (CTI) plays an indispensable role in providing evidence-
based knowledge to plan defensive strategies against advanced cyber attacks. Most threat …

The use of NLP techniques in static code analysis to detect weaknesses and vulnerabilities

SA Mokhov, J Paquet, M Debbabi - … AI 2014, Montréal, QC, Canada, May …, 2014 - Springer
We employ classical NLP techniques (n-grams and various smoothing algorithms)
combined with machine learning for non-NLP applications of detection, classification, and …

A behavior-based method for detecting distributed scan attacks in darknets

Y Feng, Y Hori, K Sakurai, J Takeuchi - Journal of information …, 2013 - jstage.jst.go.jp
The technologies used by attackers in the Internet environment are becoming more and
more sophisticated. Of the many kinds of attacks, distributed scan attacks have become one …

Practical in-depth analysis of ids alerts for tracing and identifying potential attackers on darknet

J Song, Y Lee, JW Choi, JM Gil, J Han, SS Choi - Sustainability, 2017 - mdpi.com
The darknet (ie, a set of unused IP addresses) is a very useful solution for observing the
global trends of cyber threats and analyzing attack activities on the Internet. Since the …

Intensional cyberforensics

SA Mokhov - arXiv preprint arXiv:1312.0466, 2013 - arxiv.org
This work focuses on the application of intensional logic to cyberforensic analysis and its
benefits and difficulties are compared with the finite-state-automata approach. This work …

An empirical study on darknet visualization based on topological data analysis

M Narita - International Journal of Networked and Distributed …, 2021 - Springer
We are experiencing the true dawn of an Internet of Things society, in which all things are
connected to the Internet. While this enables us to receive a wide variety of useful services …

A proposal for detecting distributed cyber-attacks using automatic thresholding

Y Feng, Y Hori, K Sakurai - 2015 10th Asia Joint Conference on …, 2015 - ieeexplore.ieee.org
Distributed attacks have reportedly caused the most serious losses in the modern cyber
environment. Thus, how to avoid and detect distributed attacks has become one of the most …