Nothing Special   »   [go: up one dir, main page]

Boukhtouta et al., 2016 - Google Patents

Network malware classification comparison using DPI and flow packet headers

Boukhtouta et al., 2016

View PDF
Document ID
11150636957717657165
Author
Boukhtouta A
Mokhov S
Lakhdari N
Debbabi M
Paquet J
Publication year
Publication venue
Journal of Computer Virology and Hacking Techniques

External Links

Snippet

In order to counter cyber-attacks and digital threats, security experts must generate, share, and exploit cyber-threat intelligence generated from malware. In this research, we address the problem of fingerprinting maliciousness of traffic for the purpose of detection and …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0245Filtering by information in the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis

Similar Documents

Publication Publication Date Title
Boukhtouta et al. Network malware classification comparison using DPI and flow packet headers
Kaur et al. Hybrid intrusion detection and signature generation using deep recurrent neural networks
Sharma et al. User behavior analytics for anomaly detection using LSTM autoencoder-insider threat detection
Salo et al. Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection
Abdallah et al. Intrusion detection systems using supervised machine learning techniques: a survey
Meng et al. Design of intelligent KNN‐based alarm filter using knowledge‐based alert verification in intrusion detection
Ahmetoglu et al. A comprehensive review on detection of cyber-attacks: Data sets, methods, challenges, and future research directions
Aleroud et al. Contextual information fusion for intrusion detection: a survey and taxonomy
Amrollahi et al. Enhancing network security via machine learning: opportunities and challenges
Vinayakumar et al. Improved DGA domain names detection and categorization using deep learning architectures with classical machine learning algorithms
Manzoor et al. Network intrusion detection system using apache storm
Kumar et al. Applications of machine learning techniques in the realm of cybersecurity
Zwane et al. Ensemble learning approach for flow-based intrusion detection system
Pillai et al. Hybrid unsupervised web-attack detection and classification–A deep learning approach
Awadh et al. Intrusion detection model based on TF. IDF and C4. 5 algorithms
Islam et al. Real-time detection schemes for memory DoS (M-DoS) attacks on cloud computing applications
Samha et al. Intrusion detection system using hybrid convolutional neural network
Pallaprolu et al. Label propagation in big data to detect remote access Trojans
Ismail et al. Incorporating known malware signatures to classify new malware variants in network traffic
Zhumabekova et al. Determining Web Application Vulnerabilities Using Machine Learning Methods
Patil et al. Learning to detect phishing web pages using lexical and string complexity analysis
Nagle et al. Feature Extraction Based Classification Technique for Intrusion Detection System
Molcer et al. Machine learning based network intrusion detection system for internet of things cybersecurity
Pakmehr et al. DDoS attack detection techniques in IoT networks: a survey
Elshafie et al. An Efficient Snort NIDSaaS based on Danger Theory and Machine Learning