Network Behavioral Analysis for Detection of Remote Access Trojans

作者: Khin Swe Yin

DOI:

关键词:

摘要:

参考文章(23)
N. Tawbi, M. Debbabi, J. Desharnais, Y. Lavoie, J. Bergeron, M. M. Erhioui, Static Detection of Malicious Code in Executable Programs ,(2000)
Smita Ranveer, Swapnaja Hiray, Comparative Analysis of Feature Extraction Methods of Malware Detection International Journal of Computer Applications. ,vol. 120, pp. 1- 7 ,(2015) , 10.5120/21220-3960
Ratinder Kaur, , Maninder Singh, A Hybrid Real-time Zero-day Attack Detection and Analysis System International Journal of Computer Network and Information Security. ,vol. 7, pp. 19- 31 ,(2015) , 10.5815/IJCNIS.2015.09.03
Danilo Bruschi, Lorenzo Martignoni, Mattia Monga, Detecting Self-mutating Malware Using Control-Flow Graph Matching Detection of Intrusions and Malware & Vulnerability Assessment. ,vol. 4064, pp. 129- 143 ,(2006) , 10.1007/11790754_8
Yi-Min Wang, D. Beck, Binh Vo, R. Roussev, C. Verbowski, Detecting stealth software with Strider GhostBuster dependable systems and networks. pp. 368- 377 ,(2005) , 10.1109/DSN.2005.39
Steven A. Hofmeyr, Stephanie Forrest, Anil Somayaji, Intrusion detection using sequences of system calls Journal of Computer Security. ,vol. 6, pp. 151- 180 ,(1998) , 10.3233/JCS-980109
Zahra Bazrafshan, Hashem Hashemi, Seyed Mehdi Hazrati Fard, Ali Hamzeh, A survey on heuristic malware detection techniques conference on information and knowledge technology. pp. 113- 120 ,(2013) , 10.1109/IKT.2013.6620049
Kyoochang Jeong, Heejo Lee, Code Graph for Malware Detection international conference on information networking. pp. 1- 5 ,(2008) , 10.1109/ICOIN.2008.4472801
Jusuk Lee, Kyoochang Jeong, Heejo Lee, Detecting metamorphic malwares using code graphs Proceedings of the 2010 ACM Symposium on Applied Computing - SAC '10. pp. 1970- 1977 ,(2010) , 10.1145/1774088.1774505