Zobrazeno 1 - 10
of 32
pro vyhledávání: '"Philip O'Kane"'
Publikováno v:
Cybersecurity, Vol 4, Iss 1, Pp 1-15 (2021)
Abstract While consumers use the web to perform routine activities, they are under the constant threat of attack from malicious websites. Even when visiting ‘trusted’ sites, there is always a risk that site is compromised, and, hosting a maliciou
Externí odkaz:
https://doaj.org/article/68930ceb3138467a9b189dd15d00db44
Publikováno v:
IEEE Access, Vol 7, Pp 47053-47067 (2019)
Ransomware is a type of advanced malware that has spread rapidly in recent years, causing significant financial losses for a wide range of victims, including organizations, healthcare facilities, and individuals. Modern host-based detection methods r
Externí odkaz:
https://doaj.org/article/b1d74ec7987440e1b0cadaba3d65341d
Publikováno v:
IET Networks, Vol 7, Iss 5, Pp 321-327 (2018)
Cybercrime has long since transformed from a world of Maverick attackers to a criminal business. Ransomware is a malware that renders a victim's computer or data unusable and is increasingly being used by criminals to generate revenue through extorti
Externí odkaz:
https://doaj.org/article/11d4b27704f9442c8779cfd59de6c5b3
Publikováno v:
IEEE Access, Vol 5, Pp 17742-17752 (2017)
The arms race between the distributors of malware and those seeking to provide defenses has so far favored the former. Signature detection methods have been unable to cope with the onslaught of new binaries aided by rapidly developing obfuscation tec
Externí odkaz:
https://doaj.org/article/a993b95944be444da841de3e5690fcb4
Publikováno v:
ANT/EDI40
Kinkead, M, Millar, S, McLaughlin, N & O'Kane, P 2021, ' Towards explainable CNNs for android malware detection ', Procedia Computer Science, vol. 184, pp. 959-965 . https://doi.org/10.1016/j.procs.2021.03.118
Kinkead, M, Millar, S, McLaughlin, N & O'Kane, P 2021, ' Towards explainable CNNs for android malware detection ', Procedia Computer Science, vol. 184, pp. 959-965 . https://doi.org/10.1016/j.procs.2021.03.118
A challenge for implementing deep learning research in the real-world is the availability of techniques that explain predictions of a model, particularly in light of potential legal requirements to give an account of algorithmic outcomes for certain
Publikováno v:
Carlin, D, O'Kane, P & Sezer, S 2018, ' Dynamic Analysis of Ransomware Using Opcodes and Opcode Categories ', International Journal on Cyber Situational Awareness, vol. 3, no. 1, pp. 84-97 . https://doi.org/10.22619/IJCSA.2018.100121
The explosion of ransomware in recent years has served as a costly re-minder that the malware threatscape has moved from that of socially-inept hobbyists to career criminals. This paper investigates the efficacy of dynamic opcode analysis in distingu
Publikováno v:
Burgess, J, Carlin, D, O'Kane, P & Sezer, S 2020, REdiREKT: Extracting Malicious Redirections from Exploit Kit Traffic . in 2020 IEEE Conference on Communications and Network Security (CNS): Proceedings ., 1570641813, Institute of Electrical and Electronics Engineers Inc., IEEE Conference on Communications and Network Security, Avignon, France, 29/06/2020 . https://doi.org/10.1109/CNS48642.2020.9162304
CNS
CNS
This paper proposes REdiREKT, a system which utilises the open-source Zeek Intrusion Detection System (IDS) to map HTTP redirection chains observed in Exploit Kit (EK) attacks and extracts distinguishing features to assist machine learning (ML). We b
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::27221887e9daa457b9a1095d7a9d682a
https://pure.qub.ac.uk/en/publications/fafadda0-0f0d-466b-a0e8-855b4938e13f
https://pure.qub.ac.uk/en/publications/fafadda0-0f0d-466b-a0e8-855b4938e13f
Publikováno v:
IET Networks, Vol 7, Iss 5, Pp 321-327 (2018)
Cybercrime has long since transformed from a world of Maverick attackers to a criminal business. Ransomware is a malware that renders a victim's computer or data unusable and is increasingly being used by criminals to generate revenue through extorti
Publikováno v:
Carlin, D, O'Kane, P & Sezer, S 2019, ' A Cost Analysis of Machine Learning Using Dynamic Runtime Opcodes for Malware Detection ', Computers & Security, vol. 85, pp. 138-155 . https://doi.org/10.1016/j.cose.2019.04.018
The ongoing battle between malware distributors and those seeking to prevent the onslaught of malicious code has, so far, favored the former. Anti-virus methods are faltering with the rapid evolution and distribution of new malware, with obfuscation
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::403d295492302d7af22e3494bc98a55b
https://pure.qub.ac.uk/en/publications/a-cost-analysis-of-machine-learning-using-dynamic-runtime-opcodes-for-malware-detection(b1afe8ce-0525-4898-9fc2-ad87ecf01bba).html
https://pure.qub.ac.uk/en/publications/a-cost-analysis-of-machine-learning-using-dynamic-runtime-opcodes-for-malware-detection(b1afe8ce-0525-4898-9fc2-ad87ecf01bba).html
Publikováno v:
Cyber Security
Burgess, J, O'Kane, P, Carlin, D & Sezer, S 2019, MANiC: Multi-step Assessment for Crypto-miners . in International Conference on Cyber Security and Protection of Digital Services 03/06/2019 → 04/06/2019 Oxford, United Kingdom . Institute of Electrical and Electronics Engineers Inc., International Conference on Cyber Security and Protection of Digital Services, Oxford, United Kingdom, 03/06/2019 . https://doi.org/10.1109/CyberSecPODS.2019.8885003
Burgess, J, O'Kane, P, Carlin, D & Sezer, S 2019, MANiC: Multi-step Assessment for Crypto-miners . in International Conference on Cyber Security and Protection of Digital Services 03/06/2019 → 04/06/2019 Oxford, United Kingdom . Institute of Electrical and Electronics Engineers Inc., International Conference on Cyber Security and Protection of Digital Services, Oxford, United Kingdom, 03/06/2019 . https://doi.org/10.1109/CyberSecPODS.2019.8885003
Modern Browsers have become sophisticated applications, providing a portal to the web. Browsers host a complex mix of interpreters such as HTML and JavaScript, allowing not only useful functionality but also malicious activities, known as browser-hij