Cyber threat is one of the most serious problem right now.
Here is my notebook with some collections and resources in cybersecurity resaerch.
Stay hungry. Saty foolish.
_____ _ _ _____ _ _____ _____
| __||_| _____ ___ | | ___ | _ || | ___ ___ ___ | __| | _ |
|__ || || || . || || -_| | __|| || .'|| ||___||__ | _ | __|_
|_____||_||_|_|_|| _||_||___| |__| |_||__,||_|_| |_____||_||__| |_|
|_|
(Simple Plan - S.P.)
- Zhao, G. U. O. D. O. N. G., et al. "Detecting APT Malware Infections Based on Malicious DNS and Traffic Analysis." Access, IEEE 3 (2015): 1132-1142. [note] [link]
- Stevanovic, Matija, et al. "On the ground truth problem of malicious DNS traffic analysis." Computers & Security 55 (2015): 142-158. [note] [link]
- Rahbarinia, Babak, Roberto Perdisci, and Manos Antonakakis. "Segugio: Efficient Behavior-Based Tracking of Malware-Control Domains in Large ISP Networks." Dependable Systems and Networks (DSN), 2015 45th Annual IEEE/IFIP International Conference on. IEEE, 2015. [note] [link]
- Ma, Xiaobo, et al. "DNSRadar: outsourcing malicious domain detection based on distributed cache-footprints." Information Forensics and Security, IEEE Transactions on 9.11 (2014): 1906-1921. [note] [link]
- Schiavoni, Stefano, et al. "Phoenix: DGA-based botnet tracking and intelligence." Detection of Intrusions and Malware, and Vulnerability Assessment. Springer International Publishing, 2014. 192-211. [note] [link]
- Bilge, Leyla, et al. "EXPOSURE: a passive DNS analysis service to detect and report malicious domains." ACM Transactions on Information and System Security (TISSEC) 16.4 (2014): 14. [note] [link]
- Antonakakis, Manos, et al. "From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware." USENIX Security Symposium. 2012. [note] [link]
- Antonakakis, Manos, et al. "Detecting Malware Domains at the Upper DNS Hierarchy." USENIX Security Symposium. 2011. [note] [link]
- Antonakakis, Manos, et al. "Building a Dynamic Reputation System for DNS." USENIX security symposium. 2010. [note] [link]
- Nadji, Yacin, et al. "Connected colors: Unveiling the structure of criminal networks." Research in Attacks, Intrusions, and Defenses. Springer Berlin Heidelberg, 2013. 390-410. [note] [link]
- Kührer, Marc, Christian Rossow, and Thorsten Holz. "Paint it black: Evaluating the effectiveness of malware blacklists." Research in Attacks, Intrusions and Defenses. Springer International Publishing, 2014. 1-21. [note] [link]
- Leigh B. Metcalf and Jonathan Spring. "Blacklist Ecosystem Analysis Update: 2014" Software Engineering Institute, 2015. [note] [link]
- Marc Kührer, Christian Rossow, and Thorsten Holz. "Technical Report: Paint It Black: Evaluating the Effectiveness of Malware Blacklists" HORST GÖRTZ INSTITUTE FOR IT-SECURITY, 2014 [note] [link]
- Leigh B. Metcalf and Jonathan Spring. "Everything You Wanted to Know About Blacklists But Were Afraid to Ask" Software Engineering Institute, 2013. [note] [link]