Darknet as a source of cyber intelligence: Survey, taxonomy, and characterization
Today, the Internet security community largely emphasizes cyberspace monitoring for the
purpose of generating cyber intelligence. In this paper, we present a survey on darknet. The …
purpose of generating cyber intelligence. In this paper, we present a survey on darknet. The …
IoTPOT: A novel honeypot for revealing current IoT threats
YMP Pa, S Suzuki, K Yoshioka… - Journal of Information …, 2016 - jstage.jst.go.jp
We analyze the increasing threats against IoT devices. We show that Telnet-based attacks
that target IoT devices have rocketed since 2014. Based on this observation, we propose an …
that target IoT devices have rocketed since 2014. Based on this observation, we propose an …
Adaptive observation of emerging cyber attacks targeting various IoT devices
S Kato, R Tanabe, K Yoshioka… - 2021 IFIP/IEEE …, 2021 - ieeexplore.ieee.org
For years, honeypots have been a valuable tool for observing cyber attacks. But in the age of
Internet-of-Things (IoT), where various kinds of devices are being connected to the Internet …
Internet-of-Things (IoT), where various kinds of devices are being connected to the Internet …
DKaaS: DARK-KERNEL as a service for active cyber threat intelligence
PVS Charan, G Ratnakaram, H Chunduri… - Computers & …, 2023 - Elsevier
Abstract Cyber Threat Intelligence (CTI) plays an indispensable role in providing evidence-
based knowledge to plan defensive strategies against advanced cyber attacks. Most threat …
based knowledge to plan defensive strategies against advanced cyber attacks. Most threat …
The use of NLP techniques in static code analysis to detect weaknesses and vulnerabilities
We employ classical NLP techniques (n-grams and various smoothing algorithms)
combined with machine learning for non-NLP applications of detection, classification, and …
combined with machine learning for non-NLP applications of detection, classification, and …
A behavior-based method for detecting distributed scan attacks in darknets
Y Feng, Y Hori, K Sakurai, J Takeuchi - Journal of information …, 2013 - jstage.jst.go.jp
The technologies used by attackers in the Internet environment are becoming more and
more sophisticated. Of the many kinds of attacks, distributed scan attacks have become one …
more sophisticated. Of the many kinds of attacks, distributed scan attacks have become one …
Practical in-depth analysis of ids alerts for tracing and identifying potential attackers on darknet
The darknet (ie, a set of unused IP addresses) is a very useful solution for observing the
global trends of cyber threats and analyzing attack activities on the Internet. Since the …
global trends of cyber threats and analyzing attack activities on the Internet. Since the …
Intensional cyberforensics
SA Mokhov - arXiv preprint arXiv:1312.0466, 2013 - arxiv.org
This work focuses on the application of intensional logic to cyberforensic analysis and its
benefits and difficulties are compared with the finite-state-automata approach. This work …
benefits and difficulties are compared with the finite-state-automata approach. This work …
An empirical study on darknet visualization based on topological data analysis
M Narita - International Journal of Networked and Distributed …, 2021 - Springer
We are experiencing the true dawn of an Internet of Things society, in which all things are
connected to the Internet. While this enables us to receive a wide variety of useful services …
connected to the Internet. While this enables us to receive a wide variety of useful services …
A proposal for detecting distributed cyber-attacks using automatic thresholding
Y Feng, Y Hori, K Sakurai - 2015 10th Asia Joint Conference on …, 2015 - ieeexplore.ieee.org
Distributed attacks have reportedly caused the most serious losses in the modern cyber
environment. Thus, how to avoid and detect distributed attacks has become one of the most …
environment. Thus, how to avoid and detect distributed attacks has become one of the most …