2013
DOI: 10.7763/ijet.2013.v5.552
|View full text |Cite
|
Sign up to set email alerts
|

Automated Malware Detection Based on Novel Network Behavioral Signatures

Abstract: Abstract-In this paper we introduce the second generation of the experimental detection framework of AIPS system which is used for experimentation with detection models and with their combinations. Our research aims mainly on detection of attacks that abuse vulnerabilities of buffer overflow type, but the final goal is to extend detection techniques to cover various types of vulnerabilities. This article describes the concept of detection framework, updated set of network metrics, provides a design of model ar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…Both papers [30,26] had similar contribution idea to the one presented in [31], the main idea behind their studies is to use sandboxes in order to decrease the false positives.…”
Section: Problem Statementmentioning
confidence: 90%
“…Both papers [30,26] had similar contribution idea to the one presented in [31], the main idea behind their studies is to use sandboxes in order to decrease the false positives.…”
Section: Problem Statementmentioning
confidence: 90%
“…In previous articles [1] [2] we proposed an idea of framework architecture that would be used for detection of various network threats. The papers presented the novel Automated Intrusion Prevention System (AlPS) which uses honeypot systems for the detection of new attacks and the automatic generation of behavioral signatures based on network flow metrics.…”
Section: Introductionmentioning
confidence: 99%