{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:05:13Z","timestamp":1730300713180,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/tencon.2018.8650218","type":"proceedings-article","created":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T17:10:38Z","timestamp":1552929038000},"page":"1172-1176","source":"Crossref","is-referenced-by-count":1,"title":["Ahead of the Curve: A Deeper Understanding of Network Threats Through Machine Learning"],"prefix":"10.1109","author":[{"given":"Joy Nathalie","family":"Avelino","sequence":"first","affiliation":[]},{"given":"Carmi","family":"Anne Loren Mora","sequence":"additional","affiliation":[]},{"given":"Jessica Patricia","family":"Balaquit","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Operation iron tiger: Exploring Chinese Cyber-Espionage Attacks on United States Defense Contractors","year":"2013","author":"chang","key":"ref30"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2007.374774"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2010.104"},{"key":"ref12","first-page":"1","article-title":"Deciphering malwares use of tls (without decryption)","author":"anderson","year":"0","journal-title":"Journal of Computer Virology and Hacking Techniques"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2015.7346821"},{"key":"ref14","article-title":"Machine learning and feature engineering for computer network security","author":"davis","year":"2017","journal-title":"PhD thesis"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/DISCEX.2000.821506","article-title":"Evaluating intrusion detection systems: the 1998 darpa off-line intrusion detection evaluation","volume":"2","author":"lippmann","year":"2000","journal-title":"Proceedings of the DARPA Information Survivability Conference and Exposition DISCEX-2000"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/DRCN.2015.7149025"},{"key":"ref17","first-page":"4","article-title":"The ghost in the browser analysis of web-based malware","author":"provos","year":"2007","journal-title":"Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets"},{"year":"2017","key":"ref18","article-title":"Machine learning and next-generation intrusion prevention system (ngips): Building a Smarter NGIPS"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.05.008"},{"article-title":"The many faces of gh0st rat: Plotting the connections between malware attacks","year":"2012","author":"fagerland","key":"ref28"},{"year":"2013","key":"ref4","article-title":"Lateral movement: How Do Threat Actors Move Deeper Into Your Network?"},{"year":"2018","key":"ref27","article-title":"Threat Encyclopedia: GHOS-TRAT"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.jnca.2012.09.004","article-title":"Review: Intrusion detection system: A comprehensive review","volume":"36","author":"liao","year":"2013","journal-title":"J Netw Comput Appl"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2836950"},{"article-title":"Decoding network data from a Gh0st RAT variant","year":"2018","author":"pantazopoulos","key":"ref29"},{"year":"2015","key":"ref5","article-title":"Inside the wire: Why Perimeter-centric Monitoring Leaves You Vulnerable"},{"article-title":"Understanding Heuristic-based Scanning vs. Sandboxing","year":"2015","author":"cade","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SysSec.2011.16"},{"article-title":"Don&#x2019;t always judge a packet by its cover","year":"2016","author":"sanchez","key":"ref2"},{"year":"2016","key":"ref9","article-title":"There is no silver bullets: The strengths and weakness of todays threat-protection techniquesand why a multi-layered approach to endpoint security is a must"},{"key":"ref1","article-title":"Intrusion detection with unlabeled data using clustering","author":"portnoy","year":"2001","journal-title":"Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA-2001"},{"article-title":"Machine learning for application-layer intrusion detection","year":"2009","author":"rieck","key":"ref20"},{"key":"ref22","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"},{"article-title":"Beyond the blacklists: Detecting malicious url through machine learning","year":"2017","author":"dong","key":"ref21"},{"article-title":"Embedding projector: Interactive visualization and interpretation of embeddings","year":"2016","author":"smilkov","key":"ref24"},{"key":"ref23","article-title":"hdbscan: Hierarchical density based clustering","volume":"2","author":"mcinnes","year":"2017","journal-title":"Open Source Software"},{"key":"ref26","article-title":"Evolution of exploit kits","author":"chen","year":"2015","journal-title":"Trends in Microbiology"},{"year":"2018","key":"ref25","article-title":"What is Ransomware?"}],"event":{"name":"TENCON 2018 - 2018 IEEE Region 10 Conference","start":{"date-parts":[[2018,10,28]]},"location":"Jeju, Korea (South)","end":{"date-parts":[[2018,10,31]]}},"container-title":["TENCON 2018 - 2018 IEEE Region 10 Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8643125\/8650051\/08650218.pdf?arnumber=8650218","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,23]],"date-time":"2020-08-23T20:25:20Z","timestamp":1598214320000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8650218\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/tencon.2018.8650218","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}