Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Domhnall Carlin"'
Publikováno v:
PeerJ Computer Science, Vol 9, p e1546 (2023)
This research examines the prevalence of research software as independent records of output within UK academic institutional repositories (IRs). There has been a steep decline in numbers of research software submissions to the UK’s Research Excelle
Externí odkaz:
https://doaj.org/article/b2d49938a64f41a5badf5290bc920c39
Publikováno v:
Cybersecurity, Vol 4, Iss 1, Pp 1-15 (2021)
Abstract While consumers use the web to perform routine activities, they are under the constant threat of attack from malicious websites. Even when visiting ‘trusted’ sites, there is always a risk that site is compromised, and, hosting a maliciou
Externí odkaz:
https://doaj.org/article/68930ceb3138467a9b189dd15d00db44
Publikováno v:
IET Networks, Vol 7, Iss 5, Pp 321-327 (2018)
Cybercrime has long since transformed from a world of Maverick attackers to a criminal business. Ransomware is a malware that renders a victim's computer or data unusable and is increasingly being used by criminals to generate revenue through extorti
Externí odkaz:
https://doaj.org/article/11d4b27704f9442c8779cfd59de6c5b3
Publikováno v:
IEEE Access, Vol 5, Pp 17742-17752 (2017)
The arms race between the distributors of malware and those seeking to provide defenses has so far favored the former. Signature detection methods have been unable to cope with the onslaught of new binaries aided by rapidly developing obfuscation tec
Externí odkaz:
https://doaj.org/article/a993b95944be444da841de3e5690fcb4
Publikováno v:
Almashhadani, A O, Carlin, D, Kaiiali, M & Sezer, S 2022, ' MFMCNS: A Multi-Feature and Multi-Classifier Network-based System for Ransomworm Detection ', Computers & Security, vol. 121, 102860 . https://doi.org/10.1016/j.cose.2022.102860
open access article Ransomware is a type of advanced malware that can encrypt a user’s files or lock a computer system until a ransom has been paid. Ransomworm is a type of malware that combines the payload of ransomware with the propagation featur
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a96b34ab8aa6a1bd5abd55b187426c49
https://hdl.handle.net/2086/22105
https://hdl.handle.net/2086/22105
Publikováno v:
Carlin, D, O'Kane, P & Sezer, S 2018, ' Dynamic Analysis of Ransomware Using Opcodes and Opcode Categories ', International Journal on Cyber Situational Awareness, vol. 3, no. 1, pp. 84-97 . https://doi.org/10.22619/IJCSA.2018.100121
The explosion of ransomware in recent years has served as a costly re-minder that the malware threatscape has moved from that of socially-inept hobbyists to career criminals. This paper investigates the efficacy of dynamic opcode analysis in distingu
Publikováno v:
Burgess, J, Carlin, D, O'Kane, P & Sezer, S 2020, REdiREKT: Extracting Malicious Redirections from Exploit Kit Traffic . in 2020 IEEE Conference on Communications and Network Security (CNS): Proceedings ., 1570641813, Institute of Electrical and Electronics Engineers Inc., IEEE Conference on Communications and Network Security, Avignon, France, 29/06/2020 . https://doi.org/10.1109/CNS48642.2020.9162304
CNS
CNS
This paper proposes REdiREKT, a system which utilises the open-source Zeek Intrusion Detection System (IDS) to map HTTP redirection chains observed in Exploit Kit (EK) attacks and extracts distinguishing features to assist machine learning (ML). We b
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::27221887e9daa457b9a1095d7a9d682a
https://pure.qub.ac.uk/en/publications/fafadda0-0f0d-466b-a0e8-855b4938e13f
https://pure.qub.ac.uk/en/publications/fafadda0-0f0d-466b-a0e8-855b4938e13f
Publikováno v:
IET Networks, Vol 7, Iss 5, Pp 321-327 (2018)
Cybercrime has long since transformed from a world of Maverick attackers to a criminal business. Ransomware is a malware that renders a victim's computer or data unusable and is increasingly being used by criminals to generate revenue through extorti
Publikováno v:
Carlin, D, O'Kane, P & Sezer, S 2019, ' A Cost Analysis of Machine Learning Using Dynamic Runtime Opcodes for Malware Detection ', Computers & Security, vol. 85, pp. 138-155 . https://doi.org/10.1016/j.cose.2019.04.018
The ongoing battle between malware distributors and those seeking to prevent the onslaught of malicious code has, so far, favored the former. Anti-virus methods are faltering with the rapid evolution and distribution of new malware, with obfuscation
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::403d295492302d7af22e3494bc98a55b
https://pure.qub.ac.uk/en/publications/a-cost-analysis-of-machine-learning-using-dynamic-runtime-opcodes-for-malware-detection(b1afe8ce-0525-4898-9fc2-ad87ecf01bba).html
https://pure.qub.ac.uk/en/publications/a-cost-analysis-of-machine-learning-using-dynamic-runtime-opcodes-for-malware-detection(b1afe8ce-0525-4898-9fc2-ad87ecf01bba).html
Publikováno v:
Cyber Security
Burgess, J, O'Kane, P, Carlin, D & Sezer, S 2019, MANiC: Multi-step Assessment for Crypto-miners . in International Conference on Cyber Security and Protection of Digital Services 03/06/2019 → 04/06/2019 Oxford, United Kingdom . Institute of Electrical and Electronics Engineers Inc., International Conference on Cyber Security and Protection of Digital Services, Oxford, United Kingdom, 03/06/2019 . https://doi.org/10.1109/CyberSecPODS.2019.8885003
Burgess, J, O'Kane, P, Carlin, D & Sezer, S 2019, MANiC: Multi-step Assessment for Crypto-miners . in International Conference on Cyber Security and Protection of Digital Services 03/06/2019 → 04/06/2019 Oxford, United Kingdom . Institute of Electrical and Electronics Engineers Inc., International Conference on Cyber Security and Protection of Digital Services, Oxford, United Kingdom, 03/06/2019 . https://doi.org/10.1109/CyberSecPODS.2019.8885003
Modern Browsers have become sophisticated applications, providing a portal to the web. Browsers host a complex mix of interpreters such as HTML and JavaScript, allowing not only useful functionality but also malicious activities, known as browser-hij