Author:
Nguyen Thi Quynh,Laborde Romain,Benzekri Abdelmalek,Oglaza Arnaud,Mounsif Mehdi
Publisher
Springer Nature Switzerland
Reference22 articles.
1. Anatomy of an APT attack: Step by step approach, Infosec Resources. https://resources.infosecinstitute.com/topic/anatomy-of-an-apt-attack-step-by-step-approach/. Accessed 24 Aug 2021
2. Benzekri, A., Laborde, R., Oglaza, A., Rammal, D., Barrere, F.: Dynamic security management driven by situations: an exploratory analysis of logs for the identification of security situations. In: 3rd Cyber Security in Networking Conference (CSNet 2019), Quito, Ecuador, p. 66 (2019). https://doi.org/10.1109/CSNet47905.2019.9108976
3. Nguyen, T.Q., Laborde, R., Benzekri, A., Qu’hen, B.: Detecting abnormal DNS traffic using unsupervised machine learning. In: 2020 4th Cyber Security in Networking Conference (CSNet), pp. 1–8 (2020). https://doi.org/10.1109/CSNet50428.2020.9265466
4. New Wekby Attacks Use DNS Requests As Command and Control Mechanism, Unit42, 24 May 2016. https://unit42.paloaltonetworks.com/unit42-new-wekby-attacks-use-dns-requests-as-command-and-control-mechanism/. Accessed 18 Jan 2022
5. Ron: Introduction, 24 August 2021. https://github.com/iagox86/dnscat2. Accessed 25 Aug 2021.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. AutoRoC-DBSCAN: automatic tuning of DBSCAN to detect malicious DNS tunnels;Annals of Telecommunications;2024-03-22
2. Network Abnormal Log Clustering Algorithm Based on DBSCAN;2023 3rd International Conference on Intelligent Communications and Computing (ICC);2023-11-24