Filters








8 Hits in 5.2 sec

Finding New Varieties of Malware with the Classification of Network Behavior

Mitsuhiro HATADA, Tatsuya MORI
2017 IEICE transactions on information and systems  
In this paper, we present a traffic model for malware that can classify network behaviors of malware and identify new varieties of malware.  ...  The results of our experiment demonstrate the effectiveness of our model in finding new varieties of malware. key words: malware communication model, clustering analysis, network behavior classification  ...  Acknowledgments A part of this work was supported by JSPS Grant-in-Aid for Scientific Research B, Grant Number JP16H02832.  ... 
doi:10.1587/transinf.2016icp0019 fatcat:w2lnpqaaenad7ha636dxmn63ju

Classification of Malware Analytics Techniques: A Systematic Literature Review

Nur Farhana Hordri, Noor Azurati Ahmad, Siti Sophiayati Yuhaniz, Shamsul Sahibuddin, Aswami Fadillah Mohd Ariffin, Nur Afifah Mohd Saupi, NazriAhmad Zamani, Yasmin Jeffry, Mohamad Firham Efendy Md Senan
2018 International Journal of Security and Its Applications  
It also provides broad information on malware analytics techniques which could be useful for practitioners.  ...  Conclusion: This review delivers the evidence that malware analytics is an active research area. The review provides researchers with some guidelines for future research on this topic.  ...  apps Cluster Information on Darknet Traffic Features S27 MAGMA network behavior classifier for malware traffic  ... 
doi:10.14257/ijsia.2018.12.2.02 fatcat:y6i3m6bcy5horhygvlem56ul7e

Table of Contents

2020 2020 Ural Symposium on Biomedical Engineering, Radioelectronics and Information Technology (USBEREIT)  
Zero Knowledge Network Traffic Analysis Algorithm Implementation 0615-0618 Tatiana Kanner, Andrey Kanner Testing Software and Hardware Data Security Tools Using the Automata Theory and the Graph  ...  and Texture-Based Classifiers for Recognition of Acute Stroke using Non-Contrast CT Images 0380-0383 Konstantin Kudryavtsev, Ustav Malkov Computation the Weak Berge Equilibrium in Finite 3-Person  ... 
doi:10.1109/usbereit48449.2020.9117721 fatcat:hq5e325pf5ftrjddcqqg464kzm

Network Traffic Measurements, Applications to Internet Services and Security

Enrico Bocchi, M. Mellia, D. Rossi
2017
Lee, "MAGMA: Network Behavior Classifier for Malware Traffic," in Elsevier Computer Networks -Special Issue on Traffic and Performance in the Big Data Era, vol. 109, Part 2, pp. 142-156, 2016.Part III  ...  MAGMA, thus, results in a general purpose malware classifier, able to leverage common features in the network traffic that characterize different families of malware.  ...  The following tables are instead intended for a more detailed view of Web pages, focusing on objects being retrieved, the related amount of bytes, and network features like the number of domains contacted  ... 
doi:10.6092/polito/porto/2665103 fatcat:4lmls2yawncrhlt7gjban4kqva

Participation in Social Networks as Feral Information Systems [chapter]

Enrico Franchi, Agostino Poggi, Michele Tomaiuolo
Social Media and Networking  
Social networking systems blur the distinction between the private and working spheres, and users are known to use such systems both at home and on the work place, both professionally and with recreative  ...  The risks include the malicious behavior of users, as well as the proliferation of viruses and malware.  ...  Among other issues, the study underlines the problems of (i) employees wasting time on social networks, (ii) risk of malware and spyware coming from high traffic sites, and (iii) bandwidth requirements  ... 
doi:10.4018/978-1-4666-8614-4.ch089 fatcat:qbscuhmxsjaatgc7paqhya4cqq

The First Workshop on Information Hiding Techniques for Internet Anonymity and Privacy

Massimo Villari
INTERNET 2012 The Fourth International Conference on Evolving Internet IHTIAP 2012   unpublished
To resist geometrical transformations, the extended synchronization templates, which help to ensure that reasonably large invariant regions will be available for carrying the watermark payload and/or for  ...  Scale-Invariant Feature Transform (SIFT) is first applied to locate the interest points, from which we form the invariant regions for watermark embedding.  ...  This can be achieved by using the graph models for network traffic processing and Netgraph technology [4] .  ... 
fatcat:qde6lpe4engxxbzy7jry4w6iw4

Online) International Journal of Network Security is published both in traditional paper form

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+102 others)
2016 International Journal of Network Security   unpublished
In performance analysis, it is observed that the Zone Routing Protocol (ZRP) out-performs the other MANET routing protocols in terms of network performance and security for the proposed scheme.  ...  attacks and improves the network performance as well.  ...  The authors gratefully acknowledge the anonymous reviewers for their valuable comments. Acknowledgments The authors gratefully acknowledge the anonymous reviewers for their valuable comments.  ... 
fatcat:ez6kvrzkuzg75nulaxycvfvxcq

Online) International Journal of Network Security is published both in traditional paper form

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+100 others)
2016 International Journal of Network Security   unpublished
For this reason, we do not need the certificate authority (CA) to store and manage users' certificates and public keys.  ...  The authors gratefully acknowledge the reviewers for their valuable comments.  ...  Acknowledgments The authors gratefully acknowledge the anonymous reviewers for their valuable comments.  ... 
fatcat:u6ux7gsrj5efxp3xc4y2gpmahu