Kaur et al., 2014 - Google Patents
Automatic evaluation and signature generation technique for thwarting zero-day attacksKaur et al., 2014
- Document ID
- 2911865339992483226
- Author
- Kaur R
- Singh M
- Publication year
- Publication venue
- Recent Trends in Computer Networks and Distributed Systems Security: Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014, Proceedings 2
External Links
Snippet
Zero-day attack is a cyber-attack which exploits vulnerabilities that have not been disclosed publicly. Zero-day attacks are very expensive and powerful attack tools. They are used in conjunction with highly sophisticated and targeted attacks to achieve stealthiness with …
- 238000000034 method 0 title abstract description 43
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bhardwaj et al. | Ransomware digital extortion: a rising new age threat | |
Hadžiosmanović et al. | N-gram against the machine: On the feasibility of the n-gram network analysis for binary protocols | |
Kaur et al. | A survey on zero-day polymorphic worm detection techniques | |
US8769692B1 (en) | System and method for detecting malware by transforming objects and analyzing different views of objects | |
Punithavathani et al. | Surveillance of anomaly and misuse in critical networks to counter insider threats using computational intelligence | |
US20160078229A1 (en) | System And Method For Threat Risk Scoring Of Security Threats | |
Chen et al. | A model-based validated autonomic approach to self-protect computing systems | |
Kaur et al. | Efficient hybrid technique for detecting zero-day polymorphic worms | |
Tarness et al. | Introducing dynamic entropy layer profiling: A novel approach for ransomware detection through behavioral feature analysis | |
Vehabovic et al. | Ransomware detection and classification strategies | |
Limer et al. | Automated ransomware detection using dynamic behavior trace profiling | |
Park et al. | Performance evaluation of a fast and efficient intrusion detection framework for advanced persistent threat-based cyberattacks | |
Rezvani et al. | Interdependent security risk analysis of hosts and flows | |
Kaur et al. | A hybrid real-time zero-day attack detection and analysis system | |
Raftopoulos et al. | Detecting, validating and characterizing computer infections in the wild | |
Zakaria et al. | Rentaka: A novel machine learning framework for crypto-ransomware pre-encryption detection | |
Atapour et al. | Modeling Advanced Persistent Threats to enhance anomaly detection techniques | |
Kaur et al. | Automatic evaluation and signature generation technique for thwarting zero-day attacks | |
Jain et al. | Techniques in detection and analyzing malware executables: a review | |
Supriya et al. | Malware detection techniques: a survey | |
Yu et al. | Research on the technology of trojan horse detection | |
Pastrana et al. | Randomized anagram revisited | |
Yu et al. | On detecting active worms with varying scan rate | |
Said et al. | Detection of mirai by syntactic and semantic analysis | |
Regi et al. | Case study on detection and prevention methods in zero day attacks |