Deepsign: Deep learning for automatic malware signature generation and classification
OE David, NS Netanyahu - 2015 International Joint Conference …, 2015 - ieeexplore.ieee.org
This paper presents a novel deep learning based method for automatic malware signature
generation and classification. The method uses a deep belief network (DBN), implemented …
generation and classification. The method uses a deep belief network (DBN), implemented …
Automated classification and analysis of internet malware
Numerous attacks, such as worms, phishing, and botnets, threaten the availability of the
Internet, the integrity of its hosts, and the privacy of its users. A core element of defense …
Internet, the integrity of its hosts, and the privacy of its users. A core element of defense …
[PDF][PDF] Behavioral clustering of http-based malware and signature generation using malicious network traces.
We present a novel network-level behavioral malware clustering system. We focus on
analyzing the structural similarities among malicious HTTP traffic traces generated by …
analyzing the structural similarities among malicious HTTP traffic traces generated by …
Method and system for detecting malicious and/or botnet-related domain names
A method and system of detecting a malicious and/or botnet-related domain name,
comprising: reviewing a domain name used in Domain Name System (DNS) traffic in a …
comprising: reviewing a domain name used in Domain Name System (DNS) traffic in a …
Systems, methods, and media for detecting network anomalies using a trained probabilistic model
Abstract Systems, methods, and media for detecting network anomalies are provided. In
some embodiments, a training dataset of communication protocol messages having …
some embodiments, a training dataset of communication protocol messages having …
Method and system for detecting and responding to attacking networks
A system and method for detecting a first network of compromised computers in a second
network of computers, comprising: collecting Domain Name System (DNS) data for the …
network of computers, comprising: collecting Domain Name System (DNS) data for the …
Systems and methods for detecting and inhibiting attacks using honeypots
In accordance with some embodiments, systems and methods that protect an application
from attacks are provided. In some embodiments, traffic from a communication network is …
from attacks are provided. In some embodiments, traffic from a communication network is …
Detecting android malware leveraging text semantics of network flows
The emergence of malicious apps poses a serious threat to the Android platform. Most types
of mobile malware rely on network interface to coordinate operations, steal users' private …
of mobile malware rely on network interface to coordinate operations, steal users' private …
Automatic generation of string signatures for malware detection
Scanning files for signatures is a proven technology, but exponential growth in unique
malware programs has caused an explosion in signature database sizes. One solution to …
malware programs has caused an explosion in signature database sizes. One solution to …
Proactive worm containment (PWC) for enterprise networks
G06F 2/4(2006.01) detection techniques are used to reduce false positives, G06F
2/16(2006.01) including a vulnerability time window lemma to avoid false GSB …
2/16(2006.01) including a vulnerability time window lemma to avoid false GSB …