A taxonomy for threat actors' delivery techniques
A Villalón-Huerta, I Ripoll-Ripoll, H Marco-Gisbert - Applied Sciences, 2022 - mdpi.com
The main contribution of this paper is to provide an accurate taxonomy for delivery
techniques, which allows the detection of novel techniques and the identification of …
techniques, which allows the detection of novel techniques and the identification of …
Malware detection system by payload analysis of network traffic
LJG Villalba, ALS Orozco… - IEEE Latin America …, 2015 - ieeexplore.ieee.org
This paper presents a system for detecting intrusions when analyzing the network traffic
payload looking for malware evidences. The system implements the detection algorithm as a …
payload looking for malware evidences. The system implements the detection algorithm as a …
A generic anti-spyware solution by access control list at kernel level
Spyware refers to programs that steal the user information stored in the user's computer and
transmit this information via the Internet to a designated home server without the user being …
transmit this information via the Internet to a designated home server without the user being …
[PDF][PDF] Anomaly-based network intrusion detection system
This paper presents a system for detecting intrusions when analyzing the network traffic
payload looking for malware evidences. The system implements the detection algorithm as a …
payload looking for malware evidences. The system implements the detection algorithm as a …
Detection of anomalous network packets using lightweight stateless payload inspection
N Nwanze, D Summerville - 2008 33rd IEEE Conference on …, 2008 - ieeexplore.ieee.org
A real-time packet-level anomaly detection approach for high-speed network intrusion
prevention is described. The approach is suitable for small and fast hardware …
prevention is described. The approach is suitable for small and fast hardware …
Prevention of information attacks by run-time detection of self-replication in computer codes
V Skormin, A Volynkin, D Summerville… - Journal of Computer …, 2007 - content.iospress.com
This paper describes a novel approach for preventative protection from both known and
previously unknown malicious software. It does not rely on screening the code for signatures …
previously unknown malicious software. It does not rely on screening the code for signatures …
Large-scale reconfigurable virtual testbed for information security experiments
A Volynkin, V Skormin - … for the Development of Networks and …, 2007 - ieeexplore.ieee.org
The vulnerability of a modem computer network to information attacks stems from its high
complexity, global interconnectivity and multiple entry points. While experimental security …
complexity, global interconnectivity and multiple entry points. While experimental security …
Evaluation of run-time detection of self-replication in binary executable malware
Volynkin, Skormin, Summerville… - 2006 IEEE Information …, 2006 - ieeexplore.ieee.org
This paper presents an overview and evaluation of a novel approach for proactive protection
against both known and previously unknown self-replicating malicious software. Instead of …
against both known and previously unknown self-replicating malicious software. Instead of …
Anomalous packet identification for network intrusion detection
DH Summerville, N Nwanze… - Proceedings from the …, 2004 - ieeexplore.ieee.org
A packet-level anomaly detection system for network intrusion detection in high-bandwidth
network environments is described. The approach is intended for hardware implementation …
network environments is described. The approach is intended for hardware implementation …
Modeling of advanced threat actors: characterization, categorization and detection
A Villalón Huerta - 2023 - riunet.upv.es
[EN] Information and its related technologies are a critical asset to protect for people,
organizations and even whole countries. Our dependency on information technologies …
organizations and even whole countries. Our dependency on information technologies …