Results 31 to 40 of about 2,124 (200)
Detection and Blockchain‐Based Collaborative Mitigation of Internet of Things Botnets
DDoS (distributed denial of service) attacks have drastically effected the functioning of Internet‐based services in recent years. Following the release of the Mirai botnet source code on GitHub, the scope of these exploitations has grown. The attackers have been able to construct and launch variations of the Mirai botnet thanks to the open‐sourcing of
Syed Muhammad Sajjad +9 more
wiley +1 more source
Focusing on the Weakest Link: A Similarity Analysis on Phishing Campaigns Based on the ATT&CK Matrix
In the past, phishing techniques were a common means of attack carried out by individuals or small groups via spam mail on a randomly selected target. However, in recent years, phishing techniques have been adopted by advanced persistent threat (APT) groups to attack organizations such as the Sony Pictures Enterprise and Korea Hydro & Nuclear Power. As
Youngsup Shin +4 more
wiley +1 more source
Cyber Threat Intelligence – Issue and Challenges [PDF]
Today threat landscape evolving at the rapid rate with many organization continuously face complex and malicious cyber threats. Cybercriminal equipped by better skill, organized and well-funded than before.
Ariffin, Aswami +3 more
core +3 more sources
This work provides an answer to the following key question: Are the Web‐based management interfaces of the contemporary off‐the‐shelf wireless access points (WAP) free of flaws and vulnerabilities? The short answer is not very much. That is, after performing a vulnerability assessment on the Web interfaces of six different WAPs by an equal number of ...
Efstratios Chatzoglou +3 more
wiley +1 more source
TriCTI: an actionable cyber threat intelligence discovery system via trigger-enhanced neural network
The cybersecurity report provides unstructured actionable cyber threat intelligence (CTI) with detailed threat attack procedures and indicators of compromise (IOCs), e.g., malware hash or URL (uniform resource locator) of command and control server.
Jian Liu +7 more
doaj +1 more source
Design of Threat Response Modeling Language for Attacker Profile Based on Probability Distribution
Threat modeling and simulation (TMS) was aimed at dynamically capturing the features of attacks, which is a challenging job in complex Industrial Internet of Things (IIoT) control systems due to the complicated relationships among attacks. Recently, Meta Attack Language (MAL) showed its powerful TMS capabilities for representing complex attacks ...
Shuqin Zhang +8 more
wiley +1 more source
Towards Cyber Threat Intelligence for the IoT
With the proliferation of digitization and its usage in critical sectors, it is necessary to include information about the occurrence and assessment of cyber threats in an organization's threat mitigation strategy. This Cyber Threat Intelligence (CTI) is
Butun, Ismail +3 more
core +1 more source
Healthcare Security Incident Response Strategy ‐ A Proactive Incident Response (IR) Procedure
The healthcare information system (HIS) has become a victim of cyberattacks. Traditional ways to handle cyber incidents in healthcare organizations follow a predefined incident response (IR) procedure. However, this procedure is usually reactive, missing the opportunities to foresee danger on the horizon.
Ying He +4 more
wiley +1 more source
Adaptive Traffic Fingerprinting for Darknet Threat Intelligence [PDF]
Darknet technology such as Tor has been used by various threat actors for organising illegal activities and data exfiltration. As such, there is a case for organisations to block such traffic, or to try and identify when it is used and for what purposes.
Al-Khateeb, Haider +3 more
core +2 more sources
A Cyber Deception Defense Method Based on Signal Game to Deal with Network Intrusion
Increasingly, cyber security personnel are using cyber deception defense techniques to deal with network intrusions. However, traditional cyber deception techniques (such as honeypots and honeynets) are easily detected by attackers, thus leading to failure.
Chungang Gao +3 more
wiley +1 more source

