Skip to main content

Showing 1–8 of 8 results for author: Varlioglu, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.07995  [pdf, other

    cs.CR

    The Pulse of Fileless Cryptojacking Attacks: Malicious PowerShell Scripts

    Authors: Said Varlioglu, Nelly Elsayed, Eva Ruhsar Varlioglu, Murat Ozer, Zag ElSayed

    Abstract: Fileless malware predominantly relies on PowerShell scripts, leveraging the native capabilities of Windows systems to execute stealthy attacks that leave no traces on the victim's system. The effectiveness of the fileless method lies in its ability to remain operational on victim endpoints through memory execution, even if the attacks are detected, and the original malicious scripts are removed. T… ▽ More

    Submitted 21 February, 2024; v1 submitted 15 January, 2024; originally announced January 2024.

    Comments: 10 pages, 1 figure

  2. arXiv:2305.19859  [pdf, other

    cs.SI

    Exploring the Journey to Drug Overdose: Applying the Journey to Crime Framework to Drug Sales Locations and Overdose Death Locations

    Authors: Murat Ozer, Ismail Onat, Halil Akbas, Nelly Elsayed, Zag ElSayed, Said Varlioglu

    Abstract: Drug overdose is a pressing public health concern in the United States, resulting in a significant number of fatalities each year. In this study, we employ the Journey to Crime (JTC) framework borrowed from the field of environmental criminology to examine the association between drug sales locations and overdose death locations. In this research, our objective is to elucidate the trajectory of ov… ▽ More

    Submitted 31 May, 2023; originally announced May 2023.

    Comments: Under review in The 7th International Conference on Applied Cognitive Computing 2023

  3. arXiv:2203.03175  [pdf, other

    cs.CR

    The Dangerous Combo: Fileless Malware and Cryptojacking

    Authors: Said Varlioglu, Nelly Elsayed, Zag ElSayed, Murat Ozer

    Abstract: Fileless malware and cryptojacking attacks have appeared independently as the new alarming threats in 2017. After 2020, fileless attacks have been devastating for victim organizations with low-observable characteristics. Also, the amount of unauthorized cryptocurrency mining has increased after 2019. Adversaries have started to merge these two different cyberattacks to gain more invisibility and p… ▽ More

    Submitted 9 March, 2022; v1 submitted 7 March, 2022; originally announced March 2022.

    Comments: 9 Pages - Accepted to be published in SoutheastCon 2022 IEEE Region 3 Technical, Professional, and Student Conference. Mobile, Alabama, USA. Mar 31st to Apr 03rd 2022. https://ieeesoutheastcon.org/

  4. arXiv:2004.05285  [pdf, other

    cs.CY cs.LG cs.SI

    Explaining the Relationship between Internet and Democracy in Partly Free Countries Using Machine Learning Models

    Authors: Mustafa Sagir, Said Varlioglu

    Abstract: Previous studies have offered a variety of explanations on the relationship between democracy and the internet. However, most of these studies concentrate on regions, specific states or authoritarian regimes. No study has investigated the influence of the internet in partly free countries defined by the Freedom House. Moreover, very little is known about the effects of online censorship on the dev… ▽ More

    Submitted 10 April, 2020; originally announced April 2020.

    Comments: "University of Cincinnati, School of Information Technology, IT EXPO Research Symposium '20, April 14, 2020, Cincinnati, OH, USA"

    ACM Class: J.4; K.4.0

  5. Is Cryptojacking Dead after Coinhive Shutdown?

    Authors: Said Varlioglu, Bilal Gonen, Murat Ozer, Mehmet F. Bastug

    Abstract: Cryptojacking is the exploitation of victims' computer resources to mine for cryptocurrency using malicious scripts. It has become popular after 2017 when attackers started to exploit legal mining scripts, especially Coinhive scripts. Coinhive was actually a legal mining service that provided scripts and servers for in-browser mining activities. Nevertheless, over 10 million web users had been vic… ▽ More

    Submitted 13 March, 2020; v1 submitted 7 January, 2020; originally announced January 2020.

    Journal ref: Proceedings of the 3rd International Conference on Information and Computer Technologies (ICICT 2020) 385-389

  6. Plunge into the Underworld: A Survey on Emergence of Darknet

    Authors: Victor Adewopo, Bilal Gonen, Said Varlioglu, Murat Ozer

    Abstract: The availability of sophisticated technologies and methods of perpetrating criminogenic activities in the cyberspace is a pertinent societal problem. Darknet is an encrypted network technology that uses the internet infrastructure and can only be accessed using special network configuration and software tools to access its contents which are not indexed by search engines. Over the years darknets t… ▽ More

    Submitted 17 March, 2020; v1 submitted 7 January, 2020; originally announced January 2020.

    Journal ref: 6th Annual Conference on Computational Science & Computational Intelligence (CSCI'19); Dec 05-07, 2019; Las Vegas, Nevada, USA

  7. A Prevention and a Traction System for Ransomware Attacks

    Authors: Murat Ozer, Said Varlioglu, Bilal Gonen, Mehmet F. Bastug

    Abstract: Over the past three years, especially following WannaCry malware, ransomware has become one of the biggest concerns for private businesses, state, and local government agencies. According to Homeland Security statistics, 1.5 million ransomware attacks have occurred per year since 2016. Cybercriminals often use creative methods to inject their malware into the target machines and use sophisticated… ▽ More

    Submitted 17 March, 2020; v1 submitted 7 January, 2020; originally announced January 2020.

    Journal ref: 6th Annual Conf. on Computational Science & Computational Intelligence (CSCI'19); Dec 05-07, 2019; Las Vegas, Nevada, USA

  8. A Rule-Based Model for Victim Prediction

    Authors: Murat Ozer, Nelly Elsayed, Said Varlioglu, Chengcheng Li, Niyazi Ekici

    Abstract: In this paper, we proposed a novel automated model, called Vulnerability Index for Population at Risk (VIPAR) scores, to identify rare populations for their future shooting victimizations. Likewise, the focused deterrence approach identifies vulnerable individuals and offers certain types of treatments (e.g., outreach services) to prevent violence in communities. The proposed rule-based engine mod… ▽ More

    Submitted 7 March, 2022; v1 submitted 5 January, 2020; originally announced January 2020.