Category: Cyber Threat Intelligence and Analytics

Security aspects of Internet of Things aided smart grids: A bibliometric survey

Security aspects of Internet of Things aided smart grids: A bibliometric survey Abstract: The integration of sensors and communication technology in power systems, known as the smart grid, is an emerging topic in science and technology. One of the critical issues in the smart grid is its increased vulnerability to cyber-threats. As such, various types […]

Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments

Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments Abstract: Current authentication protocols seek to establish authenticated sessions over insecure channels while maintaining a small footprint considering the energy consumption and computational overheads. Traditional authentication schemes must store a form of authentication data on the devices, putting this data at […]

P4-to-blockchain: A secure blockchain-enabled packet parser for software defined networking

P4-to-blockchain: A secure blockchain-enabled packet parser for software defined networking Abstract: Security is one of the most challenging issues in software defined networking (SDN), and causes include the inability to detect the contents of the packets. In addition, file transferring to SDN is a potential attack vector that can be exploited at the network level. […]

Fuzzy pattern tree for edge malware detection and categorization in IoT

Fuzzy pattern tree for edge malware detection and categorization in IoT Abstract: The surging pace of Internet of Things (IoT) development and its applications has resulted in significantly large amounts of data (commonly known as big data) being communicated and processed across IoT networks. While cloud computing has led to several possibilities in regard to […]

An opcode‐based technique for polymorphic Internet of Things malware detection

An opcode‐based technique for polymorphic Internet of Things malware detection Abstract: The increasing popularity of Internet of Things (IoT) devices makes them an attractive target for malware authors. In this paper, we use sequential pattern mining technique to detect most frequent opcode sequences of malicious IoT applications. Detected maximal frequent patterns (MFP) of opcode sequences […]

DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer

DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer Abstract: Ransomware, a malware designed to encrypt data for ransom payments, is a potential threat to fog layer nodes as such nodes typically contain considerably amount of sensitive data. The capability to efficiently hunt abnormalities relating to ransomware activities is crucial in the […]

Analysis of APT Actors Targeting IoT and Big Data Systems: Shell_Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe as a Case Study

Analysis of APT Actors Targeting IoT and Big Data Systems: Shell_Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe as a Case Study Abstract: Advanced Persistent Threats (APTs) can repeatedly threaten individuals, organisations and national targets, utilising varying tactics and methods to achieve their objectives. This study looks at six such threat groups, namely Shell_Crew, […]

A Bibliometric Analysis of Botnet Detection Techniques

A Bibliometric Analysis of Botnet Detection Techniques Abstract: Botnets are rising as a platform for many unlawful cyber activities such as Distributed Denial of Service (DDoS) attacks, malware dissemination, phishing, click fraud, and so on. As of late, detecting botnet has been an intriguing research topic in relation to cybercrime analysis and cyber-threat prevention. This […]

A Cyber Kill Chain Based Analysis of Remote Access Trojans

A Cyber Kill Chain Based Analysis of Remote Access Trojans Abstract: Computer networks and industrial systems are always under cyber threat and attack. Existing vulnerabilities in different parts of systems have given cyber attackers the opportunity to think about attacking, damaging or hindering the working process of important infrastructures of the country. Figuring out these […]

Analysis and Triage of Advanced Hacking Groups Targeting Western Countries Critical National Infrastructure: APT28, RED October, and Regin

Analysis and Triage of Advanced Hacking Groups Targeting Western Countries Critical National Infrastructure: APT28, RED October, and Regin Abstract: Many organizations still rely on traditional methods to protect themselves against various cyber threats. This is effective when they deal with traditional threats, but it is less effective when it comes to Advanced Persistent Threat (APT) […]