A survey on malware detection using data mining techniques
In the Internet age, malware (such as viruses, trojans, ransomware, and bots) has posed
serious and evolving security threats to Internet users. To protect legitimate users from these …
serious and evolving security threats to Internet users. To protect legitimate users from these …
A survey on zero-day polymorphic worm detection techniques
Zero-day polymorphic worms pose a serious threat to the Internet security. With their ability
to rapidly propagate, these worms increasingly threaten the Internet hosts and services. Not …
to rapidly propagate, these worms increasingly threaten the Internet hosts and services. Not …
All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)
EJ Schwartz, T Avgerinos… - 2010 IEEE symposium on …, 2010 - ieeexplore.ieee.org
Dynamic taint analysis and forward symbolic execution are quickly becoming staple
techniques in security analyses. Example applications of dynamic taint analysis and forward …
techniques in security analyses. Example applications of dynamic taint analysis and forward …
Integrated static and dynamic analysis for malware detection
PV Shijo, A Salim - Procedia Computer Science, 2015 - Elsevier
The number of malware is increasing rapidly regardless of the common use of anti-malware
software. Detection of malware continues to be a challenge as attackers device new …
software. Detection of malware continues to be a challenge as attackers device new …
Systems, methods, and media for detecting network anomalies using a trained probabilistic model
Abstract Systems, methods, and media for detecting network anomalies are provided. In
some embodiments, a training dataset of communication protocol messages having …
some embodiments, a training dataset of communication protocol messages having …
[PDF][PDF] Dta++: dynamic taint analysis with targeted control-flow propagation.
Dynamic taint analysis (DTA) is a powerful technique for, among other things, tracking the
flow of sensitive information. However, it is vulnerable to false negative errors caused by …
flow of sensitive information. However, it is vulnerable to false negative errors caused by …
Systems, methods, and media for outputting data based upon anomaly detection
SJ Stolfo, K Wang, J Parekh - US Patent 8,448,242, 2013 - Google Patents
Systems, methods, and media for outputting data based on anomaly detection are provided.
In some embodiments, methods for outputting data based on anomaly detection include …
In some embodiments, methods for outputting data based on anomaly detection include …
Systems, methods, and media for outputting a dataset based upon anomaly detection
SJ Stolfo, K Wang, J Parekh - US Patent 8,381,299, 2013 - Google Patents
Systems, methods, and media for outputting a dataset based upon anomaly detection are
provided. In some embodiments, methods for outputting a dataset based upon anomaly …
provided. In some embodiments, methods for outputting a dataset based upon anomaly …
Methods, media, and systems for detecting attack on a digital processing device
Methods, media, and systems for detecting attack are pro vided. In some embodiments, the
methods include: compar ing at least part of a document to a static detection model; …
methods include: compar ing at least part of a document to a static detection model; …
Anagram: A content anomaly detector resistant to mimicry attack
K Wang, JJ Parekh, SJ Stolfo - … workshop on recent advances in intrusion …, 2006 - Springer
In this paper, we present Anagram, a content anomaly detector that models a mixture ofhigh-
order n-grams (n> 1) designed to detect anomalous and “suspicious” network packet …
order n-grams (n> 1) designed to detect anomalous and “suspicious” network packet …