a b s t r a c t In this paper, we investigate cyber-threats and the underlying infrastructures. More pre-cisely, we detect and analyze cyber-threat infrastructures for the purpose of unveiling key players (owners, domains, IPs, organizations, malware families, etc.) and the relationships between these players. To this end, we propose metrics to measure the badness of different infrastructure elements using graph theoretic concepts such as centrality concepts and Google PageRank. In addition, we quantify the sharing of infrastructure elements among different malware samples and families to unveil potential groups that are behind specific attacks. Moreover, we study the evolution of cyber-threat infrastructures over time to infer patterns of ...
The recent emergence of the targeted use of malware in cyber espionage versus industry requires a sy...
Nowadays, information and communication technologies have been used to support and control almost ev...
Online crime (also known as cybercrime) is becoming more organized, more complex, and therefore, mor...
AbstractIn this paper, we investigate cyber-threats and the underlying infrastructures. More precise...
In this paper, we investigate cyber-threats and the underlying infrastructures. More precisely, we d...
Increased reliance on the Internet and other networked systems raise the risks of cyber attacks that...
The growing dependency on interconnected devices makes cyber crime increasingly lucrative. Together ...
Part 2: Security EngineeringInternational audienceCyberspace is a borderless new universe in which a...
In this short paper, we take a first step towards empirically assessing Internet-wide malicious acti...
The growth of information and communication technology is constantly revolutionizing various domains...
Abstract—Malicious Web activities continue to be a major threat to the safety of online Web users. D...
The Internet is built on top of intertwined network services, e.g., email, DNS, and content distribu...
In recent years, malware authors drastically changed their course on the subject of threat design an...
Analyzing threats that have compromised electronic devices is important to compromised organizations...
In this thesis, we present advanced techniques to approach some of the problems caused by cybercrimi...
The recent emergence of the targeted use of malware in cyber espionage versus industry requires a sy...
Nowadays, information and communication technologies have been used to support and control almost ev...
Online crime (also known as cybercrime) is becoming more organized, more complex, and therefore, mor...
AbstractIn this paper, we investigate cyber-threats and the underlying infrastructures. More precise...
In this paper, we investigate cyber-threats and the underlying infrastructures. More precisely, we d...
Increased reliance on the Internet and other networked systems raise the risks of cyber attacks that...
The growing dependency on interconnected devices makes cyber crime increasingly lucrative. Together ...
Part 2: Security EngineeringInternational audienceCyberspace is a borderless new universe in which a...
In this short paper, we take a first step towards empirically assessing Internet-wide malicious acti...
The growth of information and communication technology is constantly revolutionizing various domains...
Abstract—Malicious Web activities continue to be a major threat to the safety of online Web users. D...
The Internet is built on top of intertwined network services, e.g., email, DNS, and content distribu...
In recent years, malware authors drastically changed their course on the subject of threat design an...
Analyzing threats that have compromised electronic devices is important to compromised organizations...
In this thesis, we present advanced techniques to approach some of the problems caused by cybercrimi...
The recent emergence of the targeted use of malware in cyber espionage versus industry requires a sy...
Nowadays, information and communication technologies have been used to support and control almost ev...
Online crime (also known as cybercrime) is becoming more organized, more complex, and therefore, mor...