Zobrazeno 1 - 10
of 29
pro vyhledávání: '"B. Thanudas"'
Publikováno v:
NCC
System security is becoming an indispensable part of our daily life due to the rapid proliferation of unknown malware attacks. Recent malware found to have a very complicated structure that is hard to detect by the traditional malware detection techn
Publikováno v:
TENCON
Present day malicious software, often encountered in an Internet-enabled electronic system, turn to be extremely difficult to be detected by the existing malware detection solutions. In this paper, we introduce a novel malware detection strategy, Mem
Publikováno v:
ANTS
Traditional malware detection techniques, such as signature-based detection and traditional antivirus software, are not beneficial for detecting many recent malware threats. In this paper, we propose a novel malware detection technique, API call tran
Publikováno v:
IEEE Security & Privacy. 13:60-65
Many recent malware implementations employ virtual machines to carry out their malicious activities. These are hard to detect because their states can't be accessed by antivirus software running in the native OS. An approach for OS fingerprinting usi
Publikováno v:
International Journal of Security and Networks. 14:47
Securing an enterprise network has become a challenging task as the cyber malware attacks are improving in sophistication. Traditional centralised gateway solutions such as firewall and intrusion detection systems fail to detect highly sophisticated
Publikováno v:
2015 Annual IEEE India Conference (INDICON).
In this paper we propose a novel technique for detecting HTTP botnet traffic “N-gram based HTTP bot traffic detection” that makes use of Deep Packet Inspection (DPI) of network packets to detect hosts infected with a bot. Botnet is a collection o
Publikováno v:
Indian Journal of Science and Technology. 8
Objective: In this world of advanced technology, satellite communication is the basis for all data communications. TCP was designed to be flexible and robust but it cannot perform efficiently over the satellite links with long delay. The major object
Publikováno v:
2014 Annual IEEE India Conference (INDICON).
HTTP botnets have been a major threat to cyber security in recent years. Fast-flux technique can be detrimental to botnet detection techniques based on traffic analysis, due to its ability to hide bot traffic among normal traffic. In this paper we pr
Publikováno v:
2012 4th Computer Science and Electronic Engineering Conference (CEEC).
Data security in a highly confidential large network is of paramount importance. Confidential data networks belonging to secret agencies and government organizations are common targets for data exfiltration. This has become a growing concern in such
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.