Taxonomy of malware detection techniques: A systematic literature review

HM Deylami, RC Muniyandi, IT Ardekani… - 2016 14th Annual …, 2016 - ieeexplore.ieee.org
Malware is an international software disease. Research shows that the effect of malware is
becoming chronic. To protect against malware detectors are fundamental to the industry …

Malware capturing and detection in dionaea honeypot

PD Ali, TG Kumar - 2017 Innovations in Power and Advanced …, 2017 - ieeexplore.ieee.org
This paper proposes software based malware capturing and detection method. Which
implements an efficient malware capturing and detection method in honeypot environment. It …

Design and implementation of a malware detection system based on network behavior

L Xue, G Sun - Security and Communication Networks, 2015 - Wiley Online Library
With the increasing of new malicious software attacks, the host‐based malware detection
methods cannot always detect the latest unknown malware. Intrusion detection system does …

[PDF][PDF] Detection of threats in Honeynet using Honeywall

N Sharma, SS Sran - International Journal on Computer Science and …, 2011 - academia.edu
Information is a strategic resource and to protect this kind of confidential and private data
against possible attacks, you must take into account some security mechanisms and …

[PDF][PDF] A framework for malware detection with static features using machine learning algorithms

A Kumar - 2017 - dspace.pondiuni.edu.in
I thank my parents without whom this work would not have been possible. I also would like to
thank my wonderful sisters who had been very cooperative and gave me unsolicited …

Honeypots and Its Deployment: A Review

N Bhagat, B Arora - Emerging Trends in Expert Applications and Security …, 2019 - Springer
Over the last few decades, there has been a tremendous study on the security of networks.
The type of data that travels through these networks may contain malicious software, which …

[PDF][PDF] Defence Against Cyber-Espionage: A Cyber-Defence For IT Assets In Armed Forces As Exemplary Use Case

C Forst - 2016 - diva-portal.org
Cyber espionage is a very significant threat for various IT systems like for the military,
business networks and industrial control systems, making it necessary to have an in-detail …

[PDF][PDF] Malware Honeypot to Secure IoT Devices from Malware (May 2021)

TD Dharmakeerthi - researchgate.net
Abstracts—IoT devices make human life more effective and comfortable. People use this
smart IoT devices to do their day to day works. IoT devices are connected over the Internet …

DETEKSI MALWARE DALAM JARINGAN MENGGUNAKAN DIONAEA

M Harjono - Techno (Jurnal Fakultas Teknik, Universitas …, 2013 - jurnalnasional.ump.ac.id
Jaringan komputer yang terhubung ke Internet akan memperbesar kemungkinan terjadinya
ancaman terhadap keamanan sistem. Malware dalam bentuk virus, worm, dan trojan horses …

[ZITATION][C] Intrusion Prevention System Based on Diskless Honeypot

YE He-Tian, CAI Yun-Zhang - Journal of Shanghai Jiaotong University, 2012