A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Malware traffic detection using tamper resistant features
2015
MILCOM 2015 - 2015 IEEE Military Communications Conference
This paper presents a framework for evaluating the transport layer feature space of mal ware heartbeat traffic. We utilize these features in a prototype detection system to distinguish malware traffic from traffic generated by legitimate applications. In contrast to previous work, we eliminate features at risk of producing overly optimistic detection results , detect pre viously unobserved anomalous behavior, and rely only on tamper resistant features making it difficult for sophisticated mal
doi:10.1109/milcom.2015.7357464
dblp:conf/milcom/CelikWMS15
fatcat:ebj3zvxz6rbrfe6svdkhsxin5i