Filters








582 Hits in 4.6 sec

Detecting Unknown Massive Mailing Viruses Using Proactive Methods [chapter]

Ruiqi Hu, Aloysius K. Mok
2004 Lecture Notes in Computer Science  
Two general proactive methods, behavior skewing and cordoning, and their application in BESIDES, a prototype system that detects unknown massive mailing viruses, are presented.  ...  In this paper, we show how proactive customization of system behaviors can be used to improve the detection rate of unknown malicious executables.  ...  Implementation BESIDES is a prototype system that uses behavior skewing, behavior monitoring, and cordoning to detect unknown massive mailing viruses.  ... 
doi:10.1007/978-3-540-30143-1_5 fatcat:xgsfogpghfaajegfm6ikhjocnq

A Novel Intrusion Tolerant System Using Live Migration

Yongjoo SHIN, Sihu SONG, Yunho LEE, Hyunsoo YOON
2014 IEICE transactions on information and systems  
The result show that the proposed scheme has shorter response time and maintains than other systems and supports services during the heavy traffic. key words: intrusion tolerant system (ITS), proactive  ...  This study focuses on recovery-based methods because the other types of ITSs employ intrusion detection methods and the aim was to build ITSs to cope with situations where the intrusion cannot be detected  ...  Moreover, some of them [19] - [21] require intrusion detection algorithms, which cannot cope with unknown attacks.  ... 
doi:10.1587/transinf.e97.d.984 fatcat:rt4iiyatinboznlikdl5blk7bq

ANALYSIS AND RESEARCH OF THE CHARACTERISTICS OF STANDARDIZED IN UKRAINE ANTIVIRUS SOFTWARE

Svitlana Shevchenko, Pavlo Skladannyi, Maksym Martseniuk
2019 Cybersecurity: Education, Science, Technique  
The study used statistical methods to analyze the characteristics of antivirus software and comparative methods of comparing the various types of such programs.  ...  The basic methods of work of the antivirus – signature and heuristic – are described. The list of standardized in Ukraine antivirus programs is determined.  ...  Zillya protects user's device from viruses, spyware, Trojans, rootkits, adware, as well as from unknown threats with the help of the proactive protection.  ... 
doi:10.28925/2663-4023.2019.4.6271 fatcat:xortwekdhfbgvosokrdzkfgcii

Information Security Threats and Practices in Small Businesses

Shannon Keller, Anne Powell, Ben Horstmann, Chad Predmore, Matt Crawford
2005 Information systems management  
The development of a policy to govern the use of hardware, the Internet, and e-mail is only effective if users have a strong belief that they will be detected for improper use of the system and that the  ...  According to the 2004 CSI survey, 68 percent of respondents indicated the use of intrusion detection systems and another 45 percent have invested in the more proactive technology called intrusion prevention  ... 
doi:10.1201/1078/45099.22.2.20050301/87273.2 fatcat:ectnaw4ygrgzffu7aqnu7bolpu

Defense Mechanisms of Biological Cells: A Framework for Network Security Thinking

Kenneth Knapp, Frank Morris, Jr. Rainer, Terry Anthony Byrd
2003 Communications of the Association for Information Systems  
This paper explores the use of biology as a reference discipline that can provide meaningful insight and innovation in the area of network security.  ...  Researchers and commercial developers can use this framework to help spark ideas that lead to further research and development in network security.  ...  Proactive approach to membrane defense and crossing 3. High level of specialization of communication methods 4. Standard use of internal membrane protection of high value resources 5.  ... 
doi:10.17705/1cais.01247 fatcat:tkwkrkjg2vgxvih6ehguvs3trq

Concept, Characteristics and Defending Mechanism of Worms

Yong TANG, Jiaqing LUO, Bin XIAO, Guiyi WEI
2009 IEICE transactions on information and systems  
Mining DNS data: Mining DNS data can detect some massive mailing worms, like MyDoom.A, because those worms rely on DNS server to launch an attack. Ishibashi et al.  ...  systems to discover unknown attacks (worms), and then use automatic signature generation technique to generate accurate signatures for detection.  ... 
doi:10.1587/transinf.e92.d.799 fatcat:o6fklrowwvgdnfzkd65u3cyfsi

Dengue and dengue hemorrhagic fever

D J Gubler
1998 Clinical Microbiology Reviews  
Dengue fever, a very old disease, has reemerged in the past 20 years with an expanded geographic distribution of both the viruses and the mosquito vectors, increased epidemic activity, the development  ...  This method is no longer recommended for isolation of dengue viruses, but some laboratories continue to use it (47).  ...  It is simple and reliable and is the most rapid method. Moreover, it allows the detection of multiple viruses in patients with concurrent infections with more than one serotype (53, 94) .  ... 
pmid:9665979 pmcid:PMC88892 fatcat:jmv2qaey6bgrdfctqr6ebjbhpi

PATTERN RECOGNITION SYSTEMS UNDER ATTACK: DESIGN ISSUES AND RESEARCH CHALLENGES

BATTISTA BIGGIO, GIORGIO FUMERA, FABIO ROLI
2014 International journal of pattern recognition and artificial intelligence  
We then discuss the need of exploiting both reactive and proactive security paradigms complementarily to improve the security by design.  ...  problem of designing pattern recognition systems in adversarial settings, under an engineering viewpoint, motivated by their increasing exploitation in security-sensitive applications like spam and malware detection  ...  In Sect. 2, we define reactive and proactive arms races, using spam filtering as an example.  ... 
doi:10.1142/s0218001414600027 fatcat:3k33vqhncjcqnnaqtamukjcise

Pattern Recognition Systems under Attack [chapter]

Fabio Roli, Battista Biggio, Giorgio Fumera
2013 Lecture Notes in Computer Science  
We then discuss the need of exploiting both reactive and proactive security paradigms complementarily to improve the security by design.  ...  problem of designing pattern recognition systems in adversarial settings, under an engineering viewpoint, motivated by their increasing exploitation in security-sensitive applications like spam and malware detection  ...  In Sect. 2, we define reactive and proactive arms races, using spam filtering as an example.  ... 
doi:10.1007/978-3-642-41822-8_1 fatcat:6wbtsbfdv5dd7ity24yuwnppse

INTRUSION DETECTION SYSTEMS: A REVIEW

D. Ashok Kumar
2017 International Journal of Advanced Research in Computer Science  
WannaCry demanded US$300 per computer.  ...  The ransomware attack infected more than 230,000 computers in over 150 countries using 20 different languages to demand money from users using Bitcoin cryptocurrency.  ...  Detection 1) Is able to detect accurately 2) Generate much fewer false alarms. 1) Cannot detect novel or unknown attacks Anomaly Detection 1) Is able to detect new/unknown attacks  ... 
doi:10.26483/ijarcs.v8i8.4703 fatcat:gbd4sfehwjd6vktthnlp7jfhoa

E-Mail Security and Privacy [chapter]

Stewart Miller
1998 Handbook of Enterprise Operations Management  
unknown viruses.  ...  So even though experts claim that heuristic scanning has a 70%-80% detection rate for new and unknown viruses, it's far from perfect.  ...  Use an Intrusion Detection System An even better way to detect an attack in progress is to use an intrusion detection system (IDS)-or, in a network environment, a network intrusion detection system (NIDS  ... 
doi:10.1201/9781420052169.ch48 fatcat:dr2f2bn4tfhkzkinku62hkn74e

Analysis of non-detectable cases of Cyber Crime Law

Jonalyn G. Nalzaro, Joan Marie Oville
2014 Zenodo  
But enabled criminals with complex and sophisticated knowledge to use computers in illegal ways that may result to crimes and human rights violations.  ...  In most cases, local law enforcement agencies do not have the personnel, equipment, and practical knowledge to proactively detect computer crime.  ...  In most cases, local law enforcement agencies do not have the personnel, equipment, and practical knowledge to proactively detect computer crime.  ... 
doi:10.5281/zenodo.1968506 fatcat:k5ncf63nczdjffmixww6qgharq

Effect of Infection with a Mesogenic Strain of Newcastle Disease Virus on Infection with Highly Pathogenic Avian Influenza Virus in Chickens

Mar Costa-Hurtado, Claudio L. Afonso, Patti J. Miller, Eric Shepherd, Eric DeJesus, Diane Smith, Mary J. Pantin-Jackwood
2016 Avian diseases  
USE OF VACCINES IN RESPONSE TO AI OUTBREAKS The use of vaccines, inactivated type or recombinant, is a proven method to control AI when implemented properly and only as a tool in conjunction with strict  ...  Globally, when these methods have been used, there has been a successful control of the disease, such as the eradication of outbreaks of highly pathogenic H5N2 virus in Pennsylvania (1984) and Texas  ... 
doi:10.1637/11171-051915-reg pmid:27309067 fatcat:lmp3zz33ujcj5baskdls6zniw4

Threats from the Dark: A Review over Dark Web Investigation Research for Cyber Threat Intelligence

Randa Basheer, Bassel Alkhatib, Zhiyong Xu
2021 Journal of Computer Networks and Communications  
From proactive detection of cyberattacks to the identification of key actors, analyzing contents of the Dark Web plays a significant role in deterring cybercrimes and understanding criminal minds.  ...  In this review, we probe recent studies in the field of analyzing Dark Web content for Cyber Threat Intelligence (CTI), introducing a comprehensive analysis of their techniques, methods, tools, approaches  ...  for these attacks, and other indicators as the reasoning part of the system to detect known and unknown attacks.  ... 
doi:10.1155/2021/1302999 fatcat:w2kg4s2tsfholbf5lctv6wlzjm

Behavioral detection of malware: from a survey towards an established taxonomy

Grégoire Jacob, Hervé Debar, Eric Filiol
2008 Journal in Computer Virology  
Behavioral detection differs from appearance detection in that it identifies the actions performed by the malware rather than syntactic markers.  ...  The main drawback is that unknown malware can no longer be detected as soon as they use innovative viral techniques.  ...  If a neat decrease is observed in these rates, the behavioral detection remains severely hindered by this measure which prevents the detection of unknown strains using known viral techniques.  ... 
doi:10.1007/s11416-008-0086-0 fatcat:cf3wtkradbhr3bbboupr4zflua
« Previous Showing results 1 — 15 out of 582 results