Hatada et al., 2017 - Google Patents
Finding new varieties of malware with the classification of network behaviorHatada et al., 2017
View PDF- Document ID
- 6082966409992592090
- Author
- Hatada M
- Mori T
- Publication year
- Publication venue
- IEICE TRANSACTIONS on Information and Systems
External Links
Snippet
An enormous number of malware samples pose a major threat to our networked society. Antivirus software and intrusion detection systems are widely implemented on the hosts and networks as fundamental countermeasures. However, they may fail to detect evasive …
- 238000004458 analytical method 0 abstract description 32
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11483318B2 (en) | Providing network security through autonomous simulated environments | |
| Victor et al. | IoT malware: An attribute-based taxonomy, detection mechanisms and challenges | |
| Agarwal et al. | A closer look at intrusion detection system for web applications | |
| Prokhorenko et al. | Web application protection techniques: A taxonomy | |
| US10230750B2 (en) | Secure computing environment | |
| Le et al. | DoubleGuard: Detecting intrusions in multitier web applications | |
| US8997236B2 (en) | System, method and computer readable medium for evaluating a security characteristic | |
| Almarri et al. | Optimised malware detection in digital forensics | |
| US11632393B2 (en) | Detecting and mitigating malware by evaluating HTTP errors | |
| Deng et al. | Lexical analysis for the webshell attacks | |
| Pramono | Anomaly-based intrusion detection and prevention system on website usage using rule-growth sequential pattern analysis: Case study: Statistics of Indonesia (BPS) website | |
| Sharif | Web attacks analysis and mitigation techniques | |
| Prapty et al. | Using retriever augmented large language models for attack graph generation | |
| US20250240313A1 (en) | Large language model (llm) powered detection reasoning solution | |
| Huertas Celdrán et al. | Creation of a dataset modeling the behavior of malware affecting the confidentiality of data managed by IoT devices | |
| Hatada et al. | Finding new varieties of malware with the classification of network behavior | |
| Jayasekara | Security operations & incident management: Case study analysis | |
| Chen et al. | A proactive approach to intrusion detection and malware collection | |
| Jogdand et al. | Survey of different IDS using honeytoken based techniques to mitigate cyber threats | |
| Çelik et al. | Detection of trickbot and emotet banking trojans with machine learning | |
| Ghosh et al. | Leveraging machine learning for proactive detection and mitigation of Android RAT | |
| Pan et al. | TORCHLIGHT: Shedding LIGHT on Real-World Attacks on Cloudless IoT Devices Concealed within the Tor Network | |
| Pareek | A study of web application penetration testing | |
| RU2778635C1 (en) | System and method for outside control of the cyberattack surface | |
| Grégio et al. | Pinpointing malicious activities through network and system-level malware execution behavior |