Filters








8 Hits in 2.7 sec

SplitScreen: Enabling efficient, distributed malware detection

Sang Kil Cha, Iulian Moraru, Jiyong Jang, John Truelove, David Brumley, David G. Andersen
2011 Journal of Communications and Networks  
We present the design and implementation of a novel anti-malware system called SplitScreen.  ...  We have implemented SplitScreen as an extension to , the most popular open source anti-malware software.  ...  Finally, the efficient distributed execution made possible using SplitScreen holds the potential to enable scalable malware detection on a wide range of low-end consumer and handheld devices.  ... 
doi:10.1109/jcn.2011.6157418 fatcat:3eqwwj5sbrd7foilznenjrpkme

SplitScreen: Enabling Efficient, Distributed Malware Detection

Sang Kil Cha, Iulian Moraru, Jiyong Jang, John Truelove, David Brumley, David G. Andersen
2018
We present the design and implementation of a novel anti-malware system called SplitScreen.  ...  We have implemented SplitScreen as an extension to ClamAV [13], the most popular open source anti-malware software.  ...  Finally, the efficient distributed execution made possible using SplitScreen holds the potential to enable scalable malware detection on a wide range of low-end consumer and handheld devices.  ... 
doi:10.1184/r1/6609848.v1 fatcat:kmmz4xxsgrbnfdcev34fb3qpyy

MWMon: A Software Defined Network-based Malware Monitor

Min Jae Jo, Ji Sun Shin
2015 Journal of the Korea Industrial Information Systems Research  
In this paper, we propose a solution detecting malwares on networks using the Software Defined Network (SDN).  ...  Our main goal is designing a solution detecting malwares of mobile client without involving the client into the work.  ...  * The SDN is used to detect DDoS (Distributed Denial of Services) attacks and an intrusion of malicious applications.  ... 
doi:10.9723/jksiis.2015.20.5.037 fatcat:auomjlw43zfxfl47gjps3wddlq

Enhancing Mobile Malware Detection with Social Collaboration

Liu Yang, Vinod Ganapathy, Liviu Iftode
2011 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing  
Existing host-based malware detection solutions are often resource-intensive. We present a decentralized and resource-aware malware detection architecture for mobile devices.  ...  We leverage this concept by only keeping the hot set of signatures in the main memory of a mobile device, and distributing the whole signature database among devices belonging to the social group of the  ...  We leverage this trend to enable collaborative detection of malware by distributing the set of malware signatures amongst the members of a social group.  ... 
doi:10.1109/passat/socialcom.2011.176 dblp:conf/socialcom/YangGI11 fatcat:hcg66sbra5dbpgs4xqgm5573py

Intelligent Behavior-Based Malware Detection System on Cloud Computing Environment

Omer Aslan, Merve Ozkan-Okay, Deepti Gupta
2021 IEEE Access  
Cha et al. proposed a new malware detection system named SplitScreen [10] . It is a distributed malware detection system that uses a supplemental screening step before the signature matching stage.  ...  [10] Anti-malware system called SplitScreen. It increases detection while decreasing memory usages. 2011 Win et al. [11] A malware and rootkit detection system.  ... 
doi:10.1109/access.2021.3087316 fatcat:o657c33aireaner7yreutxixia

A Comprehensive Review on Malware Detection Approaches

Omer Aslan, Refik Samet
2020 IEEE Access  
Signature-based and heuristic-based detection approaches are fast and efficient to detect known malware, but especially signature-based detection approach has failed to detect unknown malware.  ...  INDEX TERMS Cyber security, malware classification, malware detection approaches, malware features.  ...  The SplitScreen's two-phase scanning enables fast and memory efficient malware detection that can be decomposed into a client/server process that reduces the amount of storage.  ... 
doi:10.1109/access.2019.2963724 fatcat:ecckbq7ylzbepgl5az5qfupyxi

Collaborative Security

Guozhu Meng, Yang Liu, Jie Zhang, Alexander Pokluda, Raouf Boutaba
2015 ACM Computing Surveys  
Thus far, collaboration has been used in many domains such as intrusion detection, spam filtering, botnet resistance, and vulnerability detection.  ...  Collaborative security is an abstract concept that applies to a wide variety of systems and has been used to solve security issues inherent in distributed environments.  ...  Therefore, they propose an efficient and distributed approach.  ... 
doi:10.1145/2785733 fatcat:mu6hd7jk4vgjxhdhkpvjuose4e

Practical, scalable alternative session encryption using one-time pads [article]

Marc W. Abel
2012 arXiv   pre-print
In this paper, I discredit many myths concerning one-time pads, discuss practical steps to address perceived shortcomings, and shatter the notion that secure generation, distribution, and use of mammoth  ...  A splitscreen user interface using ECMA48 escape sequences 16 is provided.  ...  You don't have to predistribute n 2 keys to enable secure communication in an nuser network. n keys is sufficient, if you have a secure facilitating hub which can distribute new keys on demand.  ... 
arXiv:1212.5086v1 fatcat:fsibkstwyjdr7g2yl5wiwciekq