Sciweavers

47 search results - page 2 / 10
» Detection of Unknown Computer Worms Activity Based on Comput...
Sort
View
ICCS
2007
Springer
13 years 11 months ago
DDDAS/ITR: A Data Mining and Exploration Middleware for Grid and Distributed Computing
We describe our project that marries data mining together with Grid computing. Specifically, we focus on one data mining application - the Minnesota Intrusion Detection System (MIN...
Jon B. Weissman, Vipin Kumar, Varun Chandola, Eric...
RAID
2004
Springer
13 years 10 months ago
HoneyStat: Local Worm Detection Using Honeypots
Worm detection systems have traditionally used global strategies and focused on scan rates. The noise associated with this approach requires statistical techniques and large data s...
David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Ju...
JCS
2011
138views more  JCS 2011»
12 years 8 months ago
Automatic analysis of malware behavior using machine learning
Malicious software—so called malware—poses a major threat to the security of computer systems. The amount and diversity of its variants render classic security defenses ineffe...
Konrad Rieck, Philipp Trinius, Carsten Willems, Th...
KDD
2009
ACM
173views Data Mining» more  KDD 2009»
13 years 10 months ago
Malware detection using statistical analysis of byte-level file content
Commercial anti-virus software are unable to provide protection against newly launched (a.k.a “zero-day”) malware. In this paper, we propose a novel malware detection techniqu...
S. Momina Tabish, M. Zubair Shafiq, Muddassar Faro...
KDD
2004
ACM
126views Data Mining» more  KDD 2004»
14 years 5 months ago
Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage
We present and empirically analyze a machine-learning approach for detecting intrusions on individual computers. Our Winnowbased algorithm continually monitors user and system beh...
Jude W. Shavlik, Mark Shavlik