A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Finding New Varieties of Malware with the Classification of Network Behavior
2017
IEICE transactions on information and systems
In this paper, we present a traffic model for malware that can classify network behaviors of malware and identify new varieties of malware. ...
The results of our experiment demonstrate the effectiveness of our model in finding new varieties of malware. key words: malware communication model, clustering analysis, network behavior classification ...
Acknowledgments A part of this work was supported by JSPS Grant-in-Aid for Scientific Research B, Grant Number JP16H02832. ...
doi:10.1587/transinf.2016icp0019
fatcat:w2lnpqaaenad7ha636dxmn63ju
Classification of Malware Analytics Techniques: A Systematic Literature Review
2018
International Journal of Security and Its Applications
It also provides broad information on malware analytics techniques which could be useful for practitioners. ...
Conclusion: This review delivers the evidence that malware analytics is an active research area. The review provides researchers with some guidelines for future research on this topic. ...
apps Cluster Information on Darknet Traffic Features S27 MAGMA network behavior classifier for malware traffic ...
doi:10.14257/ijsia.2018.12.2.02
fatcat:y6i3m6bcy5horhygvlem56ul7e
Table of Contents
2020
2020 Ural Symposium on Biomedical Engineering, Radioelectronics and Information Technology (USBEREIT)
Zero
Knowledge Network Traffic Analysis
Algorithm Implementation
0615-0618
Tatiana Kanner, Andrey Kanner
Testing Software and Hardware Data Security
Tools Using the Automata Theory and the
Graph ...
and Texture-Based Classifiers for Recognition
of Acute Stroke using Non-Contrast CT Images
0380-0383
Konstantin Kudryavtsev, Ustav Malkov
Computation the Weak Berge Equilibrium in
Finite 3-Person ...
doi:10.1109/usbereit48449.2020.9117721
fatcat:hq5e325pf5ftrjddcqqg464kzm
Network Traffic Measurements, Applications to Internet Services and Security
2017
Lee, "MAGMA: Network Behavior Classifier for Malware Traffic," in Elsevier Computer Networks -Special Issue on Traffic and Performance in the Big Data Era, vol. 109, Part 2, pp. 142-156, 2016.Part III ...
MAGMA, thus, results in a general purpose malware classifier, able to leverage common features in the network traffic that characterize different families of malware. ...
The following tables are instead intended for a more detailed view of Web pages, focusing on objects being retrieved, the related amount of bytes, and network features like the number of domains contacted ...
doi:10.6092/polito/porto/2665103
fatcat:4lmls2yawncrhlt7gjban4kqva
Participation in Social Networks as Feral Information Systems
[chapter]
Social Media and Networking
Social networking systems blur the distinction between the private and working spheres, and users are known to use such systems both at home and on the work place, both professionally and with recreative ...
The risks include the malicious behavior of users, as well as the proliferation of viruses and malware. ...
Among other issues, the study underlines the problems of (i) employees wasting time on social networks, (ii) risk of malware and spyware coming from high traffic sites, and (iii) bandwidth requirements ...
doi:10.4018/978-1-4666-8614-4.ch089
fatcat:qbscuhmxsjaatgc7paqhya4cqq
The First Workshop on Information Hiding Techniques for Internet Anonymity and Privacy
INTERNET 2012 The Fourth International Conference on Evolving Internet IHTIAP 2012
unpublished
To resist geometrical transformations, the extended synchronization templates, which help to ensure that reasonably large invariant regions will be available for carrying the watermark payload and/or for ...
Scale-Invariant Feature Transform (SIFT) is first applied to locate the interest points, from which we form the invariant regions for watermark embedding. ...
This can be achieved by using the graph models for network traffic processing and Netgraph technology [4] . ...
fatcat:qde6lpe4engxxbzy7jry4w6iw4
Online) International Journal of Network Security is published both in traditional paper form
2016
International Journal of Network Security
unpublished
In performance analysis, it is observed that the Zone Routing Protocol (ZRP) out-performs the other MANET routing protocols in terms of network performance and security for the proposed scheme. ...
attacks and improves the network performance as well. ...
The authors gratefully acknowledge the anonymous reviewers for their valuable comments.
Acknowledgments The authors gratefully acknowledge the anonymous reviewers for their valuable comments. ...
fatcat:ez6kvrzkuzg75nulaxycvfvxcq
Online) International Journal of Network Security is published both in traditional paper form
2016
International Journal of Network Security
unpublished
For this reason, we do not need the certificate authority (CA) to store and manage users' certificates and public keys. ...
The authors gratefully acknowledge the reviewers for their valuable comments. ...
Acknowledgments The authors gratefully acknowledge the anonymous reviewers for their valuable comments. ...
fatcat:u6ux7gsrj5efxp3xc4y2gpmahu