Deepsign: Deep learning for automatic malware signature generation and classification

OE David, NS Netanyahu - 2015 International Joint Conference …, 2015 - ieeexplore.ieee.org
This paper presents a novel deep learning based method for automatic malware signature
generation and classification. The method uses a deep belief network (DBN), implemented …

Automated classification and analysis of internet malware

M Bailey, J Oberheide, J Andersen, ZM Mao… - Recent Advances in …, 2007 - Springer
Numerous attacks, such as worms, phishing, and botnets, threaten the availability of the
Internet, the integrity of its hosts, and the privacy of its users. A core element of defense …

[PDF][PDF] Behavioral clustering of http-based malware and signature generation using malicious network traces.

R Perdisci, W Lee, N Feamster - NSDI, 2010 - usenix.org
We present a novel network-level behavioral malware clustering system. We focus on
analyzing the structural similarities among malicious HTTP traffic traces generated by …

Method and system for detecting malicious and/or botnet-related domain names

R Perdisci, W Lee - US Patent 10,027,688, 2018 - Google Patents
A method and system of detecting a malicious and/or botnet-related domain name,
comprising: reviewing a domain name used in Domain Name System (DNS) traffic in a …

Systems, methods, and media for detecting network anomalies using a trained probabilistic model

Y Song, AD Keromytis, SJ Stolfo - US Patent 8,844,033, 2014 - Google Patents
Abstract Systems, methods, and media for detecting network anomalies are provided. In
some embodiments, a training dataset of communication protocol messages having …

Method and system for detecting and responding to attacking networks

D Dagon, N Feamster, W Lee, R Edmonds… - US Patent …, 2013 - Google Patents
A system and method for detecting a first network of compromised computers in a second
network of computers, comprising: collecting Domain Name System (DNS) data for the …

Systems and methods for detecting and inhibiting attacks using honeypots

S Sidiroglou, AD Keromytis… - US Patent 7,904,959, 2011 - Google Patents
In accordance with some embodiments, systems and methods that protect an application
from attacks are provided. In some embodiments, traffic from a communication network is …

Detecting android malware leveraging text semantics of network flows

S Wang, Q Yan, Z Chen, B Yang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The emergence of malicious apps poses a serious threat to the Android platform. Most types
of mobile malware rely on network interface to coordinate operations, steal users' private …

Automatic generation of string signatures for malware detection

K Griffin, S Schneider, X Hu, T Chiueh - Recent Advances in Intrusion …, 2009 - Springer
Scanning files for signatures is a proven technology, but exponential growth in unique
malware programs has caused an explosion in signature database sizes. One solution to …

Proactive worm containment (PWC) for enterprise networks

P Liu, YC Jhi, L Li - US Patent 8,904,535, 2014 - Google Patents
G06F 2/4(2006.01) detection techniques are used to reduce false positives, G06F
2/16(2006.01) including a vulnerability time window lemma to avoid false GSB …