Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Arnur G. Tokhtabayev"'
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319651262
MMM-ACNS
MMM-ACNS
We present a new approach for malware clustering in the domain of their behavior. To this end, we use a system called tLab that offers analysis and detection of modern complex malware including user-oriented and targeted attacks. Due to technologies
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::49e80082686285c307d529df2d00fb8e
https://doi.org/10.1007/978-3-319-65127-9_16
https://doi.org/10.1007/978-3-319-65127-9_16
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319651262
MMM-ACNS
MMM-ACNS
We present a new system that offers detection and analysis of modern complex malware including user-oriented and targeted attacks. These attacks stem from users’ misbehavior, e.g. misinterpreting or ignoring security alerts, which lead to prolifera
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::eebc6c25121b01aba3e24e67cfafe142
https://doi.org/10.1007/978-3-319-65127-9_17
https://doi.org/10.1007/978-3-319-65127-9_17
Publikováno v:
ARES
We introduce PyTrigger, a dynamic malware analysis system that automatically exercises a malware binary extracting its behavioral profile even when specific user activity or input is required. To accomplish this, we developed a novel user activity re
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783642337031
MMM-ACNS
MMM-ACNS
Over the past years, we have experienced an increase in the quantity and complexity of malware binaries. This change has been fueled by the introduction of malware generation tools and reuse of different malcode modules. Recent malware appears to be
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8f749fd0d9c89654fce4f31350cece0f
https://doi.org/10.1007/978-3-642-33704-8_20
https://doi.org/10.1007/978-3-642-33704-8_20
Publikováno v:
2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.
A novel approach to malware detection by recognizing known inter-process and intra-process malicious functionalities in software behavior is proposed. It encompasses two essential tasks: the specification of a functionality that may involve a joint a
Publikováno v:
Computer Security – ESORICS 2010 ISBN: 9783642154966
ESORICS
ESORICS
Behavior based intrusion detection systems (BIDS) offer the only effective solution against modern malware. While dynamic BIDS have obvious advantages, their success hinges upon three interrelated factors: signature expressiveness, vulnerability to b
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6fe90e1ebeb335e39fd97cacc9a6cacc
https://doi.org/10.1007/978-3-642-15497-3_42
https://doi.org/10.1007/978-3-642-15497-3_42
Publikováno v:
IPCCC
While network worms carry various payloads and may utilize any available exploits, they all have one common component - the propagation engine. Moreover, it is important to note that the number of conceptually distinct propagation engines employed by
Publikováno v:
Communications in Computer and Information Science ISBN: 9783540739852
Local computer networks at major universities are routinely plagued by self-replicating malicious software. Due to the intensive exchange of data and information within the network, when modern viruses, worms and malicious software are introduced the
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::768ef84200f5d5a0dd9b128c07e63e73
https://doi.org/10.1007/978-3-540-73986-9_27
https://doi.org/10.1007/978-3-540-73986-9_27
Publikováno v:
IAS
We propose an anomaly based IDS that results in a decreased rate of false positives. It employs the new means of host-based detection in the system call domain with correlating anomalies reported by different hosts to the IDS server. A novel anomaly
Publikováno v:
IAS
In modern military operations, nations participate as members of a coalition. In order to realize a rapid command and control cycle, the armed forces of one nation need to establish communication links between their information system and that of oth