Before cyber-crime can happen, attackers must research the targeted organization to collect vital information about the target and pave the way for the subsequent attack phases. This cyber-attack phase is called reconnaissance or enumeration. This malicious phase allows attackers to discover information about a target to be leveraged and used in an exploit. Information such as the version of the operating system and installed applications, open ports can be detected using various tools during the reconnaissance phase. By knowing such information cyber attackers can exploit vulnerabilities that are often unique to a specific version. In this work, we develop an end-to-end system that uses machine learning techniques to detect reconnaissance ...
Attacks such as spamming, distributed denial of service and phishing have become commonp...
Many applications have used machine learning as a tool to detect malware. These applications take i...
The growing trend of computer network attacks provokes the necessity for a comprehensive cyber deter...
In order to support air traffic control services, the U.S. Federal Aviation Administration (FAA) has...
Security attacks are becoming more prevalent as cyber attackers exploit system vulnerabilities for f...
2018 IEEE Region 2 Student Activities Conference, 1st place paper competition2018 Denman Undergradua...
Distributed Denial of Service (DDoS) attacks are very common type of computer attack in the world ...
Dissertation (Ph.D.) University of Alaska Fairbanks, 2012The internet has brought about tremendous c...
With the rapid explosion of Internet of Things (IoT), IoT enabled devices have reached every corner ...
This project examines the protection methods suggested by hackers to guard against online victimizat...
The Cyber Innovation Lab brings with it the understanding and collection of the threats, vulnerabili...
The vast majority of companies do not have the requisite tools and analysis to make use of the data ...
The Department of Defense requires a secure presence in the cyber domain to successfully execute its...
During the last decade, significant research effort has been made to develop Intrusion Detection Sys...
While the threat of terrorists utilizing the Internet to execute a cyberterrorist attack is of promi...
Attacks such as spamming, distributed denial of service and phishing have become commonp...
Many applications have used machine learning as a tool to detect malware. These applications take i...
The growing trend of computer network attacks provokes the necessity for a comprehensive cyber deter...
In order to support air traffic control services, the U.S. Federal Aviation Administration (FAA) has...
Security attacks are becoming more prevalent as cyber attackers exploit system vulnerabilities for f...
2018 IEEE Region 2 Student Activities Conference, 1st place paper competition2018 Denman Undergradua...
Distributed Denial of Service (DDoS) attacks are very common type of computer attack in the world ...
Dissertation (Ph.D.) University of Alaska Fairbanks, 2012The internet has brought about tremendous c...
With the rapid explosion of Internet of Things (IoT), IoT enabled devices have reached every corner ...
This project examines the protection methods suggested by hackers to guard against online victimizat...
The Cyber Innovation Lab brings with it the understanding and collection of the threats, vulnerabili...
The vast majority of companies do not have the requisite tools and analysis to make use of the data ...
The Department of Defense requires a secure presence in the cyber domain to successfully execute its...
During the last decade, significant research effort has been made to develop Intrusion Detection Sys...
While the threat of terrorists utilizing the Internet to execute a cyberterrorist attack is of promi...
Attacks such as spamming, distributed denial of service and phishing have become commonp...
Many applications have used machine learning as a tool to detect malware. These applications take i...
The growing trend of computer network attacks provokes the necessity for a comprehensive cyber deter...