Sciweavers

655 search results - page 10 / 131
» A behavioral approach to worm detection
Sort
View
78
Voted
CN
2007
137views more  CN 2007»
14 years 9 months ago
Defending against hitlist worms using network address space randomization
Worms are self-replicating malicious programs that represent a major security threat for the Internet, as they can infect and damage a large number of vulnerable hosts at timescal...
Spyros Antonatos, Periklis Akritidis, Evangelos P....
ACSAC
2006
IEEE
15 years 3 months ago
Addressing SMTP-Based Mass-Mailing Activity within Enterprise Networks
Malicious mass-mailing activity on the Internet is a serious and continuing threat that includes mass-mailing worms, spam, and phishing. A mechanism commonly used to deliver such ...
David Whyte, Paul C. van Oorschot, Evangelos Krana...
DMIN
2006
152views Data Mining» more  DMIN 2006»
14 years 11 months ago
Anomaly Detection Using the Dempster-Shafer Method
In this paper, we implement an anomaly detection system using the Dempster-Shafer method. Using two standard benchmark problems we show that by combining multiple signals it is pos...
Qi Chen, Uwe Aickelin
CORR
2008
Springer
106views Education» more  CORR 2008»
14 years 9 months ago
Dempster-Shafer for Anomaly Detection
In this paper, we implement an anomaly detection system using the Dempster-Shafer method. Using two standard benchmark problems we show that by combining multiple signals it is pos...
Qi Chen, Uwe Aickelin
TDSC
2010
172views more  TDSC 2010»
14 years 4 months ago
Proactive Detection of Computer Worms Using Model Checking
Although recent estimates are speaking of 200,000 different viruses, worms, and Trojan horses, the majority of them are variants of previously existing malware. As these variants m...
Johannes Kinder, Stefan Katzenbeisser, Christian S...