© 2018, ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Throughout the years, hackers’ intentions’ varied from curiosity, to financial gains, to political statements. Armed with their botnets, bot masters could crash a server or website. Statistics show that botnet activity accounts for 29% of the Internet traffic. But how can bot masters establish undetected communication with their botnets? The answer lies in the Domain Name System (DNS), using which hackers host their own domain and assign to it changing IP addresses to avoid being detected. In this paper, we propose a multi-factor cyber-threat detection system that relies on DNS traffic analysis for the detection of malicious domains. The pro...
Society\u27s increasing reliance on technology, fueled by a growing desire for increased connectivit...
Society\u27s increasing reliance on technology, fueled by a growing desire for increased connectivit...
Internet‐of‐Thing (IoT) is a rapid‐emerging technology that exploits the concept of internetwork to ...
© 2018 ACM. As billions of people depend on Internet application to perform day to day tasks, the pr...
© 2018 ACM. As billions of people depend on Internet application to perform day to day tasks, the pr...
Artificial intelligence (AI) is a transformative technology for potential replacement of human tasks...
Cyberspace is quickly becoming overwhelmed with ever-evolving malware that breaches all security def...
© 2019 Association for Computing Machinery. The insecurity of the Internet-of-Things (IoT) paradigm ...
© 2019 Association for Computing Machinery. The insecurity of the Internet-of-Things (IoT) paradigm ...
© 2020 Elsevier Ltd The insecurity of the Internet-of-Things (IoT) paradigm continues to wreak havoc...
© 2020 Elsevier Ltd The insecurity of the Internet-of-Things (IoT) paradigm continues to wreak havoc...
While the usage of Artificial Intelligence and Machine Learning Software (AI/MLS) in defensive cyber...
While the usage of Artificial Intelligence and Machine Learning Software (AI/MLS) in defensive cyber...
© 2014 IEEE. This article proposes a novel methodology to detect malicious uniform resource locators...
© 2014 IEEE. This article proposes a novel methodology to detect malicious uniform resource locators...
Society\u27s increasing reliance on technology, fueled by a growing desire for increased connectivit...
Society\u27s increasing reliance on technology, fueled by a growing desire for increased connectivit...
Internet‐of‐Thing (IoT) is a rapid‐emerging technology that exploits the concept of internetwork to ...
© 2018 ACM. As billions of people depend on Internet application to perform day to day tasks, the pr...
© 2018 ACM. As billions of people depend on Internet application to perform day to day tasks, the pr...
Artificial intelligence (AI) is a transformative technology for potential replacement of human tasks...
Cyberspace is quickly becoming overwhelmed with ever-evolving malware that breaches all security def...
© 2019 Association for Computing Machinery. The insecurity of the Internet-of-Things (IoT) paradigm ...
© 2019 Association for Computing Machinery. The insecurity of the Internet-of-Things (IoT) paradigm ...
© 2020 Elsevier Ltd The insecurity of the Internet-of-Things (IoT) paradigm continues to wreak havoc...
© 2020 Elsevier Ltd The insecurity of the Internet-of-Things (IoT) paradigm continues to wreak havoc...
While the usage of Artificial Intelligence and Machine Learning Software (AI/MLS) in defensive cyber...
While the usage of Artificial Intelligence and Machine Learning Software (AI/MLS) in defensive cyber...
© 2014 IEEE. This article proposes a novel methodology to detect malicious uniform resource locators...
© 2014 IEEE. This article proposes a novel methodology to detect malicious uniform resource locators...
Society\u27s increasing reliance on technology, fueled by a growing desire for increased connectivit...
Society\u27s increasing reliance on technology, fueled by a growing desire for increased connectivit...
Internet‐of‐Thing (IoT) is a rapid‐emerging technology that exploits the concept of internetwork to ...