Zobrazeno 1 - 10
of 104
pro vyhledávání: '"KIEKINTVELD, CHRISTOPHER"'
Autor:
Ige, Tosin, Kiekintveld, Christopher, Piplai, Aritran, Waggler, Amy, Kolade, Olukunle, Matti, Bolanle Hafiz
Phishing is one of the most effective ways in which cybercriminals get sensitive details such as credentials for online banking, digital wallets, state secrets, and many more from potential victims. They do this by spamming users with malicious URLs
Externí odkaz:
http://arxiv.org/abs/2411.16751
Domain Generation Algorithms (DGAs) are malicious techniques used by malware to dynamically generate seemingly random domain names for communication with Command & Control (C&C) servers. Due to the fast and simple generation of DGA domains, detection
Externí odkaz:
http://arxiv.org/abs/2410.21723
The ever-evolving ways attacker continues to im prove their phishing techniques to bypass existing state-of-the-art phishing detection methods pose a mountain of challenges to researchers in both industry and academia research due to the inability of
Externí odkaz:
http://arxiv.org/abs/2402.17249
In this research, we analyzed the suitability of each of the current state-of-the-art machine learning models for various cyberattack detection from the past 5 years with a major emphasis on the most recent works for comparative study to identify the
Externí odkaz:
http://arxiv.org/abs/2402.17045
Autor:
Ige, Tosin, Kiekintveld, Christopher
Bayesian classifiers perform well when each of the features is completely independent of the other which is not always valid in real world application. The aim of this study is to implement and compare the performances of each variant of Bayesian cla
Externí odkaz:
http://arxiv.org/abs/2308.11834
Honeypots play a crucial role in implementing various cyber deception techniques as they possess the capability to divert attackers away from valuable assets. Careful strategic placement of honeypots in networks should consider not only network aspec
Externí odkaz:
http://arxiv.org/abs/2308.11817
Autor:
Sayed, Md Abu, Anwar, Ahmed H., Kiekintveld, Christopher, Bosansky, Branislav, Kamhoua, Charles
Publikováno v:
International Conference on Decision and Game Theory for Security, pp. 44-63. Cham: Springer International Publishing, 2022
Reconnaissance activities precedent other attack steps in the cyber kill chain. Zero-day attacks exploit unknown vulnerabilities and give attackers the upper hand against conventional defenses. Honeypots have been used to deceive attackers by misrepr
Externí odkaz:
http://arxiv.org/abs/2307.13107
Autor:
Roy, Shanto, Sharmin, Nazia, Miah, Mohammad Sujan, Acosta, Jaime C, Kiekintveld, Christopher, Laszka, Aron
Adversarial reconnaissance is a crucial step in sophisticated cyber-attacks as it enables threat actors to find the weakest points of otherwise well-defended systems. To thwart reconnaissance, defenders can employ cyber deception techniques, such as
Externí odkaz:
http://arxiv.org/abs/2306.06769
Adversaries are often able to penetrate networks and compromise systems by exploiting vulnerabilities in people and systems. The key to the success of these attacks is information that adversaries collect throughout the phases of the cyber kill chain
Externí odkaz:
http://arxiv.org/abs/2105.04749
Many security and other real-world situations are dynamic in nature and can be modelled as strictly competitive (or zero-sum) dynamic games. In these domains, agents perform actions to affect the environment and receive observations -- possibly imper
Externí odkaz:
http://arxiv.org/abs/2010.11243