A comprehensive review on malware detection approaches
According to the recent studies, malicious software (malware) is increasing at an alarming
rate, and some malware can hide in the system by using different obfuscation techniques. In …
rate, and some malware can hide in the system by using different obfuscation techniques. In …
A survey of binary code similarity
Binary code similarityapproaches compare two or more pieces of binary code to identify their
similarities and differences. The ability to compare binary code enables many real-world …
similarities and differences. The ability to compare binary code enables many real-world …
AVclass: A Tool for Massive Malware Labeling
Labeling a malicious executable as a variant of a known family is important for security
applications such as triage, lineage, and for building reference datasets in turn used for …
applications such as triage, lineage, and for building reference datasets in turn used for …
Detection of malicious web activity in enterprise computer networks
A processing device in one embodiment comprises a processor coupled to a memory and is
configured to obtain internal log data of a computer network of an enterprise, to extract …
configured to obtain internal log data of a computer network of an enterprise, to extract …
Identifying encrypted malware traffic with contextual flow data
Identifying threats contained within encrypted network traffic poses a unique set of
challenges. It is important to monitor this traffic for threats and malware, but do so in a way …
challenges. It is important to monitor this traffic for threats and malware, but do so in a way …
Machine learning based botnet detection using real-time extracted traffic features
S Ranjan - US Patent 8,682,812, 2014 - Google Patents
(57) ABSTRACT A method for identifying a botnet in a network, including analyzing historical
network data using a pre-determined heuristic to determine values of a feature in the …
network data using a pre-determined heuristic to determine values of a feature in the …
Deciphering malware's use of TLS (without decryption)
The use of TLS by malware poses new challenges to network threat detection because
traditional pattern-matching techniques can no longer be applied to its messages. However …
traditional pattern-matching techniques can no longer be applied to its messages. However …
Detecting environment-sensitive malware
The execution of malware in an instrumented sandbox is a widespread approach for the
analysis of malicious code, largely because it sidesteps the difficulties involved in the static …
analysis of malicious code, largely because it sidesteps the difficulties involved in the static …
Packet-level signatures for smart home devices
mart home devices are vulnerable to passive inference attacks based on network traffic,
even in the presence of encryption. In this paper, we present PINGPONG, a tool that can …
even in the presence of encryption. In this paper, we present PINGPONG, a tool that can …
[PDF][PDF] Building a dynamic reputation system for {DNS}
Abstract The Domain Name System (DNS) is an essential protocol used by both legitimate
Internet applications and cyber attacks. For example, botnets rely on DNS to support agile …
Internet applications and cyber attacks. For example, botnets rely on DNS to support agile …