The pervasiveness of technology (e.g., the internet) is coupled with an expansion of the threat landscape. The numerous network services, versions of these services, and possible configurations make it difficult to predict the likelihood of a security incident (e.g., data breach) for hosts on the public internet. We attempt to explore this problem by analyzing data from Censys, a database of internet-wide scans, to collect network configurations for organizations that reported security incidents in 2017-2018. We seek to determine which common patterns in network configurations are associated with likelihood of reporting a security incident by providing a comparison between victim and non-victim organizations' hosts. We design a data pipelin...
The task of generating network-based evidence to support network forensic investigation is becoming ...
International audienceMalware is a major threat to security and privacy of network users. A huge var...
The rapid growth of the Internet has triggered an explosion in the number of applications that lever...
Nowadays does the internet presence of companies increase, and with it, their attack surface and the...
The current evolution of the cyber-threat ecosystem shows that no system can be considered invulnera...
The huge number of alerts generated by network-based defense systems prevents detailed manual inspec...
In the face of large-scale automated social engineering attacks to large online services, fast detec...
Networks are increasingly subjected to threats that affect the reliability of critical infrastructur...
Abstract Having the ability to forecast cyberattacks before they happen will unquestionably change t...
Recent high-profile cyber-attacks exemplify why organizations need better cyber-defenses. Cyber-thre...
OA-julkaisu. Tuo IEEE:n tietokannasta, kun julkaistu.Attacks over the Internet are becoming more and...
The cyber domain is a great business enabler providing many types of enterprises new opportunities s...
Intrusion Detection Systems (IDS), designed during the early era of the Internet to protect against ...
Cyber attacks have become more prevalent in the last few years, and several attacks have made headli...
The evolution of the cyber threat landscape drives companies towards state-of-the-art security monit...
The task of generating network-based evidence to support network forensic investigation is becoming ...
International audienceMalware is a major threat to security and privacy of network users. A huge var...
The rapid growth of the Internet has triggered an explosion in the number of applications that lever...
Nowadays does the internet presence of companies increase, and with it, their attack surface and the...
The current evolution of the cyber-threat ecosystem shows that no system can be considered invulnera...
The huge number of alerts generated by network-based defense systems prevents detailed manual inspec...
In the face of large-scale automated social engineering attacks to large online services, fast detec...
Networks are increasingly subjected to threats that affect the reliability of critical infrastructur...
Abstract Having the ability to forecast cyberattacks before they happen will unquestionably change t...
Recent high-profile cyber-attacks exemplify why organizations need better cyber-defenses. Cyber-thre...
OA-julkaisu. Tuo IEEE:n tietokannasta, kun julkaistu.Attacks over the Internet are becoming more and...
The cyber domain is a great business enabler providing many types of enterprises new opportunities s...
Intrusion Detection Systems (IDS), designed during the early era of the Internet to protect against ...
Cyber attacks have become more prevalent in the last few years, and several attacks have made headli...
The evolution of the cyber threat landscape drives companies towards state-of-the-art security monit...
The task of generating network-based evidence to support network forensic investigation is becoming ...
International audienceMalware is a major threat to security and privacy of network users. A huge var...
The rapid growth of the Internet has triggered an explosion in the number of applications that lever...