Nothing Special   »   [go: up one dir, main page]

Kaur et al., 2014 - Google Patents

Automatic evaluation and signature generation technique for thwarting zero-day attacks

Kaur et al., 2014

Document ID
2911865339992483226
Author
Kaur R
Singh M
Publication year
Publication venue
Recent Trends in Computer Networks and Distributed Systems Security: Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014, Proceedings 2

External Links

Snippet

Zero-day attack is a cyber-attack which exploits vulnerabilities that have not been disclosed publicly. Zero-day attacks are very expensive and powerful attack tools. They are used in conjunction with highly sophisticated and targeted attacks to achieve stealthiness with …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof

Similar Documents

Publication Publication Date Title
Bhardwaj et al. Ransomware digital extortion: a rising new age threat
Hadžiosmanović et al. N-gram against the machine: On the feasibility of the n-gram network analysis for binary protocols
Kaur et al. A survey on zero-day polymorphic worm detection techniques
US8769692B1 (en) System and method for detecting malware by transforming objects and analyzing different views of objects
Punithavathani et al. Surveillance of anomaly and misuse in critical networks to counter insider threats using computational intelligence
US20160078229A1 (en) System And Method For Threat Risk Scoring Of Security Threats
Chen et al. A model-based validated autonomic approach to self-protect computing systems
Kaur et al. Efficient hybrid technique for detecting zero-day polymorphic worms
Tarness et al. Introducing dynamic entropy layer profiling: A novel approach for ransomware detection through behavioral feature analysis
Vehabovic et al. Ransomware detection and classification strategies
Limer et al. Automated ransomware detection using dynamic behavior trace profiling
Park et al. Performance evaluation of a fast and efficient intrusion detection framework for advanced persistent threat-based cyberattacks
Rezvani et al. Interdependent security risk analysis of hosts and flows
Kaur et al. A hybrid real-time zero-day attack detection and analysis system
Raftopoulos et al. Detecting, validating and characterizing computer infections in the wild
Zakaria et al. Rentaka: A novel machine learning framework for crypto-ransomware pre-encryption detection
Atapour et al. Modeling Advanced Persistent Threats to enhance anomaly detection techniques
Kaur et al. Automatic evaluation and signature generation technique for thwarting zero-day attacks
Jain et al. Techniques in detection and analyzing malware executables: a review
Supriya et al. Malware detection techniques: a survey
Yu et al. Research on the technology of trojan horse detection
Pastrana et al. Randomized anagram revisited
Yu et al. On detecting active worms with varying scan rate
Said et al. Detection of mirai by syntactic and semantic analysis
Regi et al. Case study on detection and prevention methods in zero day attacks