Filters








11 Hits in 7.0 sec

INTRUSION DETECTION SYSTEMS: A REVIEW

D. Ashok Kumar
2017 International Journal of Advanced Research in Computer Science  
WannaCry Attack: In May 2017, the WannaCry Ransomware spread through the Internet, using an exploit vector named EternalBlue.  ...  to develop a morphological framework for IDS for easy understanding.  ...  P2P Bots A peer-to-peer botnet is a decentralized group of malware-compromised machines working together for an attacker's purpose without their owners' knowledge.  ... 
doi:10.26483/ijarcs.v8i8.4703 fatcat:gbd4sfehwjd6vktthnlp7jfhoa

Survey of Machine Learning Techniques for Malware Analysis [article]

Daniele Ucci, Leonardo Aniello, Roberto Baldoni
2018 arXiv   pre-print
We also outline a number of issues and challenges, including those concerning the used datasets, and identify the main current topical trends and how to possibly advance them.  ...  Coping with malware is getting more and more challenging, given their relentless growth in complexity and volume.  ...  Memory accesses Any data of interest such as user generated content, Windows Registry key, configuration and network activity passes through main memory, hence analysing how memory is accessed can reveal  ... 
arXiv:1710.08189v2 fatcat:b5ob6qtmo5gu7gcmoeo4yw6kye

SIGL: Securing Software Installations Through Deep Graph Learning [article]

Xueyuan Han, Xiao Yu, Thomas Pasquier, Ding Li, Junghwan Rhee, James Mickens, Margo Seltzer, Haifeng Chen
2021 arXiv   pre-print
SIGL collects traces of system call activity, building a data provenance graph that it analyzes using a novel autoencoder architecture with a graph long short-term memory network (graph LSTM) for the encoder  ...  and a standard multilayer perceptron for the decoder.  ...  Cette recherche a été financée par le Conseil de recherches en sciences naturelles et en génie du Canada (CRSNG).  ... 
arXiv:2008.11533v2 fatcat:dqdb6itehjbhpesqq6pn56wasq

An orchestration approach for unwanted Internet traffic identification

Eduardo Feitosa, Eduardo Souto, Djamel H. Sadok
2012 Computer Networks  
needs a payload).  ...  It permits the hiding of the protocol structure (data and control messages through their encryption).  ... 
doi:10.1016/j.comnet.2012.04.018 fatcat:2aeso6gfq5dmhixzfzpjo7jrwm

D1.1 - State of the Art Analysis

Danilo Ardagna
2021 Zenodo  
) introducing the software development frameworks and hardware solutions which allow to run such applications in a computing continuum.  ...  The aim of the AI-SPRINT "Artificial intelligence in Secure PRIvacy-preserving computing coNTinuum" project is to develop a platform composed of design and runtime management tools to seamlessly design  ...  Indeed, black box approaches can derive performance models from data to make predictions without a priori knowledge about the internals of the target system.  ... 
doi:10.5281/zenodo.6372377 fatcat:f6ldfuwivbcltew4smiiwphfty

NSUWorks Improved Detection for Advanced Polymorphic Malware Improved Detection for Advanced Polymorphic Malware

James Fraley, James Fraley, James Fraley
2017 unpublished
The study constructed a prototype to automate feature extraction, assemble files for analysis, and analyze results through multiple clustering algorithms.  ...  This study provided a novel approach to expand the malware body of knowledge and improve the detection for polymorphic malware targeting Microsoft operating systems. iv  ...  WEKA had a major upgrade and release that took time to configure. Yara and Volatility are tools for analysis. Volatility is an advanced memory analysis framework for deeper inspection of memory.  ... 
fatcat:nyxs77nwsvepfpbboz23nrbjdy

International Journal of Computer Science July 2021

IJCSIS Editor
2021 Zenodo  
See authors guide for manuscript preparation and submission guidelines.  ...  , state of the art, research, standards, implementations, running experiments, applications, and industrial case studies.  ...  Indeed, through these classifications many network intruders or intrusions are discovered..  ... 
doi:10.5281/zenodo.5543977 fatcat:vxk2ynl3l5bbpcvpda2lt4qef4

A Taxonomy and Qualitative Comparison of Program Analysis Techniques for Security Assessment of Android Software

Alireza Sadeghi, Hamid Bagheri, Joshua Garcia, Sam Malek
2017 IEEE Transactions on Software Engineering  
This paper contributes a comprehensive taxonomy to classify and characterize the state-of-the-art research in this area.  ...  The systematic analysis of the research literature has revealed patterns, trends, and gaps in the existing literature, and underlined key challenges and opportunities that will shape the focus of future  ...  -09-1-0273 from the Army Research Office, HSHQDC-14-C-B0040 from the Department of Homeland Security, and FA95501610030 from the Air Force Office of Scientific Research.  ... 
doi:10.1109/tse.2016.2615307 fatcat:lf4auma3fbe6thk4bxxsvasg4u

The Ethics of Cybersecurity

S.N.
2020
Against this backdrop this new book series from Springer provides a forum for interdisciplinary discussion and normative analysis of emerging technologies that are likely to have a significant impact on  ...  In attempting to navigate utopian and dystopian visions of the future, it becomes clear that technological progress and its moral quandaries call for new policies and legislative responses.  ...  The authors are grateful to Stephanie Loreck and Oleg Geier for comments on a draft of this chapter.  ... 
doi:10.5167/uzh-194182 fatcat:g6nlulogfng75d4fl6yw7xqbse

OSTP-AWhite House Office of Science and Technology Policy Request for Information on the Future of Artificial Intelligence

Kris Kitchen
2017 Figshare  
White House Office of Science and Technology Policy Request for Information on the Future of Artificial Intelligence  ...  Erik Brynjolfsson and Andrew McAfee (http://secondmachineage.com), and by Frey and Osborne (2013) that AI and autonomous systems may replace humans in a large fraction of current jobs, on a timescale that  ...  For the long term, we recommend policies that will encourage the designers of transformative AI systems to work together cooperatively, perhaps through multinational and multicorporate collaborations,  ... 
doi:10.6084/m9.figshare.4640305 fatcat:26aelpe4ejbupao5yh2mys2pzq

AN ENHANCEMENT ON TARGETED PHISHING ATTACKS IN THE STATE OF QATAR

Y Al-Hamar
2021
Therefore, this research aims to explore targeted attacks in specific organisations in the state of Qatar by presenting a new technique to prevent targeted attacks.  ...  The latest report by Kaspersky on Spam and Phishing, listed Qatar as one of the top 10 countries by percentage of email phishing and targeted phishing attacks.  ...  The request for information and responds to it without the knowledge of the user.  ... 
doi:10.24377/ljmu.t.00011837 fatcat:s3ecq4zenjghniewsfnz37c2ca