scispace - formally typeset
K

Krzysztof Cabaj

Researcher at Warsaw University of Technology

Publications -  62
Citations -  746

Krzysztof Cabaj is an academic researcher from Warsaw University of Technology. The author has contributed to research in topics: Malware & The Internet. The author has an hindex of 12, co-authored 56 publications receiving 561 citations.

Papers
More filters
Journal ArticleDOI

Software-defined networking-based crypto ransomware detection using HTTP traffic characteristics

TL;DR: A novel Software-Defined Networking (SDN) based detection approach that utilizes the characteristics of the ransomware communication is presented, concluding that an analysis of the HTTP message sequences and their respective content sizes is enough to detect such threats.
Journal ArticleDOI

Using Software-Defined Networking for Ransomware Mitigation: The Case of CryptoWall

TL;DR: The design of an SDN-based system is described, implemented using OpenFlow, that facilitates a timely reaction to this threat, and is a crucial factor in the case of crypto ransomware.
Journal ArticleDOI

The New Threats of Information Hiding: The Road Ahead

TL;DR: A recent trend involves exploiting various information-hiding techniques to empower malware-for example, to bypass mobile device security frameworks or to exfiltrate sensitive data as mentioned in this paper, which can be utilized by malware.
Journal ArticleDOI

Cybersecurity education: Evolution of the discipline and analysis of master programs

TL;DR: These latest guidelines are used to analyse and review 21 cybersecurity master programs, focusing on the contents of their courses, structure, admission requirements, duration, requirements for completion, and evolution.
Journal Article

Network activity analysis of CryptoWall ransomware

TL;DR: In this paper, the authors present the analysis of the CryptoWall ransomware network behavior using HoneyPot technology as well as the automatic run-time malware analytical system called Maltester, and present the practical results of the analyses, technologies and tools used, and gained experience with dynamic analysis of ransomware software in a dedicated environment.