Papers - PSJoshi/Notes GitHub Wiki

Security analysis of webproxy logs

  • Beehive: Large-scale log analysis for detecting suspiciousactivity in enterprise networks,
  • ExecScent: Mining for newC&C domains in live networks with adaptive control protocol tem-plates
  • Webwitness:Investigating, categorizing, and mitigating malware download paths. A. Oprea, Z. Li, K. Bowers, and R. Norris, “MADE: Security Analytics for Enterprise Threat Detection
  • BAYWATCH: robust beaconing detection to identify infectedhosts in large-scale enterprise networks
  • Automated generation of features for enterprise security - http://www.ccs.neu.edu/home/alina/papers/FeatureEng.pdf

Malware beaconing papers