Cyber Threat Intelligence and Analytics: Cyber attack triage is among most complicated and time-consuming tasks of security analysts. These triage activities are mainly focused on analyzing malware, exploit-kits and other attack payloads for timely identification of attack payloads (i.e. the malware). AI has a lot to offer to cyber threat triage and may significantly reduce the required time and resources to respond to an incident. Cyber Science Lab built a number of unique datasets for AI-Aided cyber threat triage as lack of suitable security datasets for AI tasks is among most important barriers in advancing research in this field. CSL has contributed to several researches for AI-aided Malware Analysis, Ransomware Analysis, AI-aided threat attribution and Cyber Threat Analytics.

Adaptive Traffic Fingerprinting for Darknet Threat Intelligence
Adaptive Traffic Fingerprinting for Darknet Threat Intelligence Abstract: Darknet technology such as Tor has been used by various threat actors
Read more.
Machine Learning Aided Static Malware Analysis: A Survey and Tutorial
Machine Learning Aided Static Malware Analysis: A Survey and Tutorial Abstract: Malware analysis and detection techniques have been evolving during
Read more.
Leveraging Machine Learning Techniques for Windows Ransomware Network Traffic Detection
Leveraging Machine Learning Techniques for Windows Ransomware Network Traffic Detection Abstract: Ransomware has become a significant global threat with the
Read more.
Intelligent OS X malware threat detection with code inspection
Intelligent OS X malware threat detection with code inspection Abstract: With the increasing market share of Mac OS X operating
Read more.
Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence
Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence. Abstract: Emergence of crypto-ransomware has significantly changed
Read more.
A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence
A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence Abstract: Malware such as banking Trojans are
Read more.
Detecting crypto-ransomware in IoT networks based on energy consumption footprint
Detecting crypto-ransomware in IoT networks based on energy consumption footprint Abstract: An Internet of Things (IoT) architecture generally consists of
Read more.
Machine learning aided Android malware classification
Machine learning aided Android malware classification Abstract: The widespread adoption of Android devices and their capability to access significant private
Read more.
Honeypots for Employee Information Security Awareness and Education Training: A Conceptual EASY Training Model
Honeypots for Employee Information Security Awareness and Education Training: A Conceptual EASY Training Model Abstract: The increasing pervasiveness of Internet-connected
Read more.
A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks
A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks Abstract: With increasing reliance
Read more.
Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing
Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing Abstract: Widespread adoption of cloud computing has increased the
Read more.
Exploit Kits: The production line of the Cybercrime Economy?
Exploit Kits: The production line of the Cybercrime Economy? Abstract: The annual cost of Cybercrime to the global economy is
Read more.