2017
DOI: 10.3390/su9020262
|View full text |Cite
|
Sign up to set email alerts
|

Practical In-Depth Analysis of IDS Alerts for Tracing and Identifying Potential Attackers on Darknet

Abstract: Abstract:The darknet (i.e., a set of unused IP addresses) is a very useful solution for observing the global trends of cyber threats and analyzing attack activities on the Internet. Since the darknet is not connected with real systems, in most cases, the incoming packets on the darknet ('the darknet traffic') do not contain a payload. This means that we are unable to get real malware from the darknet traffic. This situation makes it difficult for security experts (e.g., academic researchers, engineers, operato… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 20 publications
0
5
0
Order By: Relevance
“…CPS sensing devices communicate via wireless communication technologies to enhance the system's flexibility, but due to the broadcast nature of wireless media, they pose more security risks [121,122] and are susceptible to multiple cyber-physical attacks. A cyber-attack is the attack performed via malware or access to communication network components.…”
Section: Data Security and Privacymentioning
confidence: 99%
“…CPS sensing devices communicate via wireless communication technologies to enhance the system's flexibility, but due to the broadcast nature of wireless media, they pose more security risks [121,122] and are susceptible to multiple cyber-physical attacks. A cyber-attack is the attack performed via malware or access to communication network components.…”
Section: Data Security and Privacymentioning
confidence: 99%
“…In this section, we are going to discuss some of the previous works that applied machine learning in malware analysis. Machine learning has been successfully applied to the identification and detection of malware [9,10]. It was shown in [11] that machine learning can also be used to characterize malware families.…”
Section: Related Workmentioning
confidence: 99%
“…Extensive research has been proposed and new research is still performed regarding the provision of solutions for malware detection systems [13,14]. For instance, in the case of known malware, content signatures-based methods that map samples of activities against known malware have been proposed [15,16].…”
Section: Related Workmentioning
confidence: 99%