Abstract
Hacking incidents have become so commonplace that no organization seems out of reach for hackers. Even the US National Security Agency (NSA) seemed to have been the victim of successful hacks, as witnessed by recent public document dumps related to sensitive cyber warfare tools and technologies used by this organization. No day passes by without news reports on new hacking incidents. While two decades ago, most hackers were script kiddies motivated primarily by simple curiosity or the need for fame, many hackers, today, are professionals seeking financial gains, or conducting political activism, or involved in state-sponsored cyber espionage.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
DARPA Broad Agency Announcement # DARPA-BAA-12-06 (2012) http://www.darpa.mil
Eshete B, Alhuzali A, Monshizadeh M, Porras P, Venkatakrishnan V, Yegneswaran V (2015) EKHunter: a counter-offensive toolkit for exploit kit infiltration. In: NDSS symposium, 8–11 February 2015, San Diego, CA, USA
Garasia SS, Rana DP, Mehta RG (2012) HTTP Botnet detection using frequent pattern set mining. Int J Eng Sci Adv Technol 2(3):619–624
Lee JK, Moon SY, Park JH (2016) CloudRPS: a cloud analysis based enhanced ransomware prevention system. J Supercomput. doi:10.1007/s11227-016-1825-5
Schiavoni S, Maggi F, Cavallaro L, Zanero S (2014) Phoenix: DGA-based Botnet tracking and intelligence. In: Dietrich S (ed) DIMVA 2014, LNCS, vol. 8550. Springer, Heidelberg, pp 192–211
Tyagi AK, Nayeem S (2012) Detecting HTTP Botnet using Artificial Immune System (AIS). Int J Appl Inf Syst 2(6):38–45. ISSN: 2249-0868, Foundation of Computer Science FCS, New York, USA. www.ijais.org
Venkatesh GK, Nadarajan RA (2012) HTTP Botnet detection using adaptive learning rate multilayer feed-forward neural network. In: Askoxylakis I, Pöhls HC, Posegga J (eds) WISTP 2012, LNCS, vol. 7322. International Federation for Information Processing (IFIP), Laxenburg, pp 38–48
Zhao D, Traore I (2012) P2P Botnet detection through malicious fast flux network identification. In: 7th International conference on P2P, parallel, grid, cloud, and internet computing-3PGCIC, 12–14 November 2012, Victoria, BC, Canada
Zhao D, Traore I, Sayed B, Lu W, Saad S, Ghorbani A, Garant D (2013) Botnet detection based on traffic behavior analysis and flow intervals. Comput Secur 39:2–16
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Traoré, I., Awad, A., Woungang, I. (2017). Introduction: Emerging Threats Call for New Security Paradigms. In: Traoré, I., Awad, A., Woungang, I. (eds) Information Security Practices. Springer, Cham. https://doi.org/10.1007/978-3-319-48947-6_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-48947-6_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-48946-9
Online ISBN: 978-3-319-48947-6
eBook Packages: EngineeringEngineering (R0)