Taxonomy of malware detection techniques: A systematic literature review
Malware is an international software disease. Research shows that the effect of malware is
becoming chronic. To protect against malware detectors are fundamental to the industry …
becoming chronic. To protect against malware detectors are fundamental to the industry …
Malware capturing and detection in dionaea honeypot
PD Ali, TG Kumar - 2017 Innovations in Power and Advanced …, 2017 - ieeexplore.ieee.org
This paper proposes software based malware capturing and detection method. Which
implements an efficient malware capturing and detection method in honeypot environment. It …
implements an efficient malware capturing and detection method in honeypot environment. It …
Design and implementation of a malware detection system based on network behavior
With the increasing of new malicious software attacks, the host‐based malware detection
methods cannot always detect the latest unknown malware. Intrusion detection system does …
methods cannot always detect the latest unknown malware. Intrusion detection system does …
[PDF][PDF] Detection of threats in Honeynet using Honeywall
N Sharma, SS Sran - International Journal on Computer Science and …, 2011 - academia.edu
Information is a strategic resource and to protect this kind of confidential and private data
against possible attacks, you must take into account some security mechanisms and …
against possible attacks, you must take into account some security mechanisms and …
[PDF][PDF] A framework for malware detection with static features using machine learning algorithms
A Kumar - 2017 - dspace.pondiuni.edu.in
I thank my parents without whom this work would not have been possible. I also would like to
thank my wonderful sisters who had been very cooperative and gave me unsolicited …
thank my wonderful sisters who had been very cooperative and gave me unsolicited …
Honeypots and Its Deployment: A Review
N Bhagat, B Arora - Emerging Trends in Expert Applications and Security …, 2019 - Springer
Over the last few decades, there has been a tremendous study on the security of networks.
The type of data that travels through these networks may contain malicious software, which …
The type of data that travels through these networks may contain malicious software, which …
[PDF][PDF] Defence Against Cyber-Espionage: A Cyber-Defence For IT Assets In Armed Forces As Exemplary Use Case
C Forst - 2016 - diva-portal.org
Cyber espionage is a very significant threat for various IT systems like for the military,
business networks and industrial control systems, making it necessary to have an in-detail …
business networks and industrial control systems, making it necessary to have an in-detail …
[PDF][PDF] Malware Honeypot to Secure IoT Devices from Malware (May 2021)
TD Dharmakeerthi - researchgate.net
Abstracts—IoT devices make human life more effective and comfortable. People use this
smart IoT devices to do their day to day works. IoT devices are connected over the Internet …
smart IoT devices to do their day to day works. IoT devices are connected over the Internet …
DETEKSI MALWARE DALAM JARINGAN MENGGUNAKAN DIONAEA
M Harjono - Techno (Jurnal Fakultas Teknik, Universitas …, 2013 - jurnalnasional.ump.ac.id
Jaringan komputer yang terhubung ke Internet akan memperbesar kemungkinan terjadinya
ancaman terhadap keamanan sistem. Malware dalam bentuk virus, worm, dan trojan horses …
ancaman terhadap keamanan sistem. Malware dalam bentuk virus, worm, dan trojan horses …
[ZITATION][C] Intrusion Prevention System Based on Diskless Honeypot
YE He-Tian, CAI Yun-Zhang - Journal of Shanghai Jiaotong University, 2012