2019 11th International Conference on Cyber Conflict (CyCon) 2019
DOI: 10.23919/cycon.2019.8756814
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learninģ-based Detection of C&C Channels with a Focus on the Locked Shields Cyber Defense Exercise

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 5 publications
0
6
0
Order By: Relevance
“…The research paper titled "Machine Learning-based Detection of C&C Channels with a Focus on the Locked Shields Cyber Defence Exercise," authored by Känzig et al (2019), introduces a system tailored to find Command and Control (C&C) channels within network traffic, with particular emphasis on the Locked Shields cyber defence exercise, as seen in Fig. 15.…”
Section: Machine Learning's Role In Locked Shields Defencementioning
confidence: 99%
“…The research paper titled "Machine Learning-based Detection of C&C Channels with a Focus on the Locked Shields Cyber Defence Exercise," authored by Känzig et al (2019), introduces a system tailored to find Command and Control (C&C) channels within network traffic, with particular emphasis on the Locked Shields cyber defence exercise, as seen in Fig. 15.…”
Section: Machine Learning's Role In Locked Shields Defencementioning
confidence: 99%
“…While cyber ranges are strictly not emulators, they provide an excellent source of data to train new data-driven capabilities -as seen in e.g. [26]. Examples of cyber ranges are: CCDCOE's cyber range 10 (NATO/Estonia); AIT's cyber range 11 (Austria), CRATE [21] (Sweden); and NCR 12 (Norway).…”
Section: B Emulation and Cyber Exercisesmentioning
confidence: 99%
“…Examples of cyber ranges are: CCDCOE's cyber range 10 (NATO/Estonia); AIT's cyber range 11 (Austria), CRATE [21] (Sweden); and NCR 12 (Norway). The aforementioned work [26] used logs from the 2019 Locked Shields cyber exercise, hosted by CCDCOE, to label a subset of the generated logs in order to train a ML model for detecting command & control traffic.…”
Section: B Emulation and Cyber Exercisesmentioning
confidence: 99%
See 2 more Smart Citations