A taxonomy for threat actors' delivery techniques

A Villalón-Huerta, I Ripoll-Ripoll, H Marco-Gisbert - Applied Sciences, 2022 - mdpi.com
The main contribution of this paper is to provide an accurate taxonomy for delivery
techniques, which allows the detection of novel techniques and the identification of …

Malware detection system by payload analysis of network traffic

LJG Villalba, ALS Orozco… - IEEE Latin America …, 2015 - ieeexplore.ieee.org
This paper presents a system for detecting intrusions when analyzing the network traffic
payload looking for malware evidences. The system implements the detection algorithm as a …

A generic anti-spyware solution by access control list at kernel level

SSM Chow, LCK Hui, SM Yiu, KP Chow… - Journal of Systems and …, 2005 - Elsevier
Spyware refers to programs that steal the user information stored in the user's computer and
transmit this information via the Internet to a designated home server without the user being …

[PDF][PDF] Anomaly-based network intrusion detection system

LJG Villalba, ALS Orozco, JM Vidal - IEEE Latin America …, 2015 - researchgate.net
This paper presents a system for detecting intrusions when analyzing the network traffic
payload looking for malware evidences. The system implements the detection algorithm as a …

Detection of anomalous network packets using lightweight stateless payload inspection

N Nwanze, D Summerville - 2008 33rd IEEE Conference on …, 2008 - ieeexplore.ieee.org
A real-time packet-level anomaly detection approach for high-speed network intrusion
prevention is described. The approach is suitable for small and fast hardware …

Prevention of information attacks by run-time detection of self-replication in computer codes

V Skormin, A Volynkin, D Summerville… - Journal of Computer …, 2007 - content.iospress.com
This paper describes a novel approach for preventative protection from both known and
previously unknown malicious software. It does not rely on screening the code for signatures …

Large-scale reconfigurable virtual testbed for information security experiments

A Volynkin, V Skormin - … for the Development of Networks and …, 2007 - ieeexplore.ieee.org
The vulnerability of a modem computer network to information attacks stems from its high
complexity, global interconnectivity and multiple entry points. While experimental security …

Evaluation of run-time detection of self-replication in binary executable malware

Volynkin, Skormin, Summerville… - 2006 IEEE Information …, 2006 - ieeexplore.ieee.org
This paper presents an overview and evaluation of a novel approach for proactive protection
against both known and previously unknown self-replicating malicious software. Instead of …

Anomalous packet identification for network intrusion detection

DH Summerville, N Nwanze… - Proceedings from the …, 2004 - ieeexplore.ieee.org
A packet-level anomaly detection system for network intrusion detection in high-bandwidth
network environments is described. The approach is intended for hardware implementation …

Modeling of advanced threat actors: characterization, categorization and detection

A Villalón Huerta - 2023 - riunet.upv.es
[EN] Information and its related technologies are a critical asset to protect for people,
organizations and even whole countries. Our dependency on information technologies …