2006
DOI: 10.1109/msp.2006.1708419
|View full text |Cite
|
Sign up to set email alerts
|

Detecting and identifying malware: a new signal processing goal

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2009
2009
2018
2018

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(11 citation statements)
references
References 7 publications
0
11
0
Order By: Relevance
“…Finally, most prior work looks at high frequency behavior; we instead consider events which occur at very low frequencies (sub1Hz) and use long observation windows (hours to days) to see such events. Our work is a specific example of applying signal processing to network traffic [13].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Finally, most prior work looks at high frequency behavior; we instead consider events which occur at very low frequencies (sub1Hz) and use long observation windows (hours to days) to see such events. Our work is a specific example of applying signal processing to network traffic [13].…”
Section: Related Workmentioning
confidence: 99%
“…To apply signal processing to network traffic we first must generate a timeseries of events that represent network traffic [13]. We begin by discarding all traffic that is not of interest, then map events of interest into a fixed-interval timeseries of events per time period.…”
Section: A Timeseries Extractionmentioning
confidence: 99%
“…In terms of spectrum analysis, Mitra et al [23] proposed an anomaly detection method based on spectrum analysis. They focused on the harmonic structure of the traffic data spectrum obtained by the Fourier transform and wavelet to detect DDoS and bottleneck traffic.…”
Section: Spectrum Analysismentioning
confidence: 99%
“…This is proposed as a complementary approach to existing DoS detection and defense mechanisms that identify attacks. The use of the Fourier transform has also been proposed in [23] and [16]. However, in all these works the focus is more on fingerprinting and on the recognition of different kinds of anomalies once a candidate anomaly inside a specific time interval has already been identified.…”
Section: Related Workmentioning
confidence: 99%