Malphase: Fine-grained malware detection using network flow data
M Piskozub, F De Gaspari, F Barr-Smith… - Proceedings of the …, 2021 - dl.acm.org
Economic incentives encourage malware authors to constantly develop new, increasingly
complex malware to steal sensitive data or blackmail individuals and companies into paying …
complex malware to steal sensitive data or blackmail individuals and companies into paying …
Malware behavior image for malware variant identification
Several methods have been devised by researchers to facilitate malware analysis and one
of them is through malware visualization. Malware visualization is a field that focuses on …
of them is through malware visualization. Malware visualization is a field that focuses on …
[HTML][HTML] A comparative study of support vector machine and neural networks for file type identification using n-gram analysis
File type identification (FTI) has become a major discipline for anti-virus developers, firewall
designers and for forensic cybercrime investigators. Over the past few years, research has …
designers and for forensic cybercrime investigators. Over the past few years, research has …
[HTML][HTML] A novel privacy preserving user identification approach for network traffic
The prevalence of the Internet and cloud-based applications, alongside the technological
evolution of smartphones, tablets and smartwatches, has resulted in users relying upon …
evolution of smartphones, tablets and smartwatches, has resulted in users relying upon …
Analysis and detection of malicious data exfiltration in web traffic
A Al-Bataineh, G White - 2012 7th International Conference on …, 2012 - ieeexplore.ieee.org
Data stealing botnets pose a great risk to the security of networks and the privacy of their
users. Most of these botnets use the web as a medium for communication, making them …
users. Most of these botnets use the web as a medium for communication, making them …
HTTP attack detection using n-gram analysis
A Oza, K Ross, RM Low, M Stamp - Computers & Security, 2014 - Elsevier
Previous research has shown that byte-level analysis of network traffic can be useful for
network intrusion detection and traffic analysis. Such an approach does not require any …
network intrusion detection and traffic analysis. Such an approach does not require any …
[HTML][HTML] Hierarchy-based file fragment classification
File fragment classification is an essential problem in digital forensics. Although several
attempts had been made to solve this challenging problem, a general solution has not been …
attempts had been made to solve this challenging problem, a general solution has not been …
[PDF][PDF] A Content-based File Identification Dataset: collection, construction, and evaluation
SD Khudhur, HA Jeiad - Karbala International Journal of Modern Science, 2022 - iasj.net
Abstract File-Type Identification (FTI) is one of the essential functions that can be performed
by examining the data blocks' magic numbers. However, this examination leads to a …
by examining the data blocks' magic numbers. However, this examination leads to a …
User profiling from network traffic via novel application-level interactions
Insider misuse has become a significant issue for organisations. Traditional information
security has focussed upon threats from the outside rather than employees. A wide range of …
security has focussed upon threats from the outside rather than employees. A wide range of …