Skip to content
Pradyumna Joshi edited this page Sep 5, 2019 · 1 revision

Security analysis of webproxy logs

  • Beehive: Large-scale log analysis for detecting suspiciousactivity in enterprise networks,
  • ExecScent: Mining for newC&C domains in live networks with adaptive control protocol tem-plates
  • Webwitness:Investigating, categorizing, and mitigating malware download paths. A. Oprea, Z. Li, K. Bowers, and R. Norris, “MADE: Security Analytics for Enterprise Threat Detection
  • BAYWATCH: robust beaconing detection to identify infectedhosts in large-scale enterprise networks
  • Automated generation of features for enterprise security - http://www.ccs.neu.edu/home/alina/papers/FeatureEng.pdf

Malware beaconing papers

Clone this wiki locally