Methods, Devices, and Systems for Communicating Behavioral Analysis Information

作者: Mihai Christodorescu , Rajarshi Gupta , Andres Valencia

DOI:

关键词: Behavioral analysisAuthentication informationDistributed computingMonitoring systemMobile computingClassifier (UML)Mutual authenticationComputer networkMalwareApplication programming interfaceComputer science

摘要: Methods, systems and devices for communicating behavior analysis information using an application programming interface (API) may include receiving via the API a request to register second module access operation of behavioral monitoring system mobile computing device, exchanging authentication between first accomplish mutual authentication. Aspects version identification that be used by server determine how interpret, evaluate, or crowd-source information, cause send server. further provision malware model including command causing classifier device.

参考文章(219)
S. Momina Tabish, M. Zubair Shafiq, Muddassar Farooq, Malware detection using statistical analysis of byte-level file content knowledge discovery and data mining. pp. 23- 31 ,(2009) , 10.1145/1599272.1599278
Gianluigi Folino, Clara Pizzuti, Giandomenico Spezzano, An ensemble-based evolutionary framework for coping with distributed intrusion detection Genetic Programming and Evolvable Machines. ,vol. 11, pp. 131- 146 ,(2010) , 10.1007/S10710-010-9101-6
Bruce McCorkendale, Carey S Nachenberg, Securing executable content using a trusted computing platform ,(2002)
Alexandru Niculescu-Mizil, Rich Caruana, Predicting good probabilities with supervised learning Proceedings of the 22nd international conference on Machine learning - ICML '05. pp. 625- 632 ,(2005) , 10.1145/1102351.1102430
Chad Verbowski, John Dunagan, Helen J. Wang, Yi-Min Wang, Chun Yuan, Zheng Zhang, Yu Chen, STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support usenix large installation systems administration conference. pp. 159- 172 ,(2003)
Jeremy Z. Kolter, Marcus A. Maloof, Learning to detect malicious executables in the wild knowledge discovery and data mining. pp. 470- 478 ,(2004) , 10.1145/1014052.1014105
Deepak Venugopal, George Tuvell, Matthew Pfefferle, Non-Signature Malware Detection System and Method for Mobile Platforms ,(2007)
Jesse Collins, Ronald Yang, Scott Hansma, Alan Arbizu, Andrey Gusev, Methods and systems for making effective use of system resources ,(2011)
Duane Stewart Maxwell, Stephen Lawrence Tomlin, Kenneth Earl Steele, Steven Michael Adler, Andrew Shane Huang, Systems and methods for location, motion, and contact detection and tracking in a networked audiovisual device ,(2007)