Malphase: Fine-grained malware detection using network flow data

M Piskozub, F De Gaspari, F Barr-Smith… - Proceedings of the …, 2021 - dl.acm.org
Economic incentives encourage malware authors to constantly develop new, increasingly
complex malware to steal sensitive data or blackmail individuals and companies into paying …

Malware behavior image for malware variant identification

SZM Shaid, MA Maarof - 2014 International Symposium on …, 2014 - ieeexplore.ieee.org
Several methods have been devised by researchers to facilitate malware analysis and one
of them is through malware visualization. Malware visualization is a field that focuses on …

[HTML][HTML] A comparative study of support vector machine and neural networks for file type identification using n-gram analysis

J Sester, D Hayes, M Scanlon, NA Le-Khac - Forensic Science International …, 2021 - Elsevier
File type identification (FTI) has become a major discipline for anti-virus developers, firewall
designers and for forensic cybercrime investigators. Over the past few years, research has …

[HTML][HTML] A novel privacy preserving user identification approach for network traffic

N Clarke, F Li, S Furnell - computers & security, 2017 - Elsevier
The prevalence of the Internet and cloud-based applications, alongside the technological
evolution of smartphones, tablets and smartwatches, has resulted in users relying upon …

Analysis and detection of malicious data exfiltration in web traffic

A Al-Bataineh, G White - 2012 7th International Conference on …, 2012 - ieeexplore.ieee.org
Data stealing botnets pose a great risk to the security of networks and the privacy of their
users. Most of these botnets use the web as a medium for communication, making them …

HTTP attack detection using n-gram analysis

A Oza, K Ross, RM Low, M Stamp - Computers & Security, 2014 - Elsevier
Previous research has shown that byte-level analysis of network traffic can be useful for
network intrusion detection and traffic analysis. Such an approach does not require any …

[HTML][HTML] Hierarchy-based file fragment classification

M Bhatt, A Mishra, MWU Kabir, SE Blake-Gatto… - Machine Learning and …, 2020 - mdpi.com
File fragment classification is an essential problem in digital forensics. Although several
attempts had been made to solve this challenging problem, a general solution has not been …

Malware behaviour visualization

SZM Shaid, MA Maarof - Jurnal Teknologi, 2014 - journals.utm.my
The number of unique malware variants released each year is on the rise. Researchers may
often need to use manual static and dynamic analysis to study new malware samples …

[PDF][PDF] A Content-based File Identification Dataset: collection, construction, and evaluation

SD Khudhur, HA Jeiad - Karbala International Journal of Modern Science, 2022 - iasj.net
Abstract File-Type Identification (FTI) is one of the essential functions that can be performed
by examining the data blocks' magic numbers. However, this examination leads to a …

User profiling from network traffic via novel application-level interactions

G Alotibi, N Clarke, F Li, S Furnell - 2016 11th International …, 2016 - ieeexplore.ieee.org
Insider misuse has become a significant issue for organisations. Traditional information
security has focussed upon threats from the outside rather than employees. A wide range of …