Gandotra et al., 2019 - Google Patents
Malware intelligence: beyond malware analysisGandotra et al., 2019
- Document ID
- 13401751406857843397
- Author
- Gandotra E
- Bansal D
- Sofat S
- Publication year
- Publication venue
- International Journal of Advanced Intelligence Paradigms
External Links
Snippet
A number of malware samples are available online but a little research has attempted to thoroughly analyse these for obtaining insights or intelligence about their behavioural trends, which can further be used to issue early warnings about future threats. In this paper …
- 238000004458 analytical method 0 title abstract description 59
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11277423B2 (en) | Anomaly-based malicious-behavior detection | |
Milajerdi et al. | Poirot: Aligning attack behavior with kernel audit records for cyber threat hunting | |
US11882134B2 (en) | Stateful rule generation for behavior based threat detection | |
Roseline et al. | A comprehensive survey of tools and techniques mitigating computer and mobile malware attacks | |
Kharaz et al. | {UNVEIL}: A {Large-Scale}, automated approach to detecting ransomware | |
US10581879B1 (en) | Enhanced malware detection for generated objects | |
EP3531329B1 (en) | Anomaly-based-malicious-behavior detection | |
Jang et al. | Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information | |
US10122742B1 (en) | Classifying software modules based on comparisons using a neighborhood distance metric | |
JP2019082989A (en) | Systems and methods of cloud detection, investigation and elimination of targeted attacks | |
Talukder | Tools and techniques for malware detection and analysis | |
US11693961B2 (en) | Analysis of historical network traffic to identify network vulnerabilities | |
US20070107058A1 (en) | Intrusion detection using dynamic tracing | |
Kim et al. | WebMon: ML-and YARA-based malicious webpage detection | |
Čeponis et al. | Towards a robust method of dataset generation of malicious activity for anomaly-based HIDS training and presentation of AWSCTD dataset | |
US20240054215A1 (en) | Cyber threat information processing apparatus, cyber threat information processing method, and storage medium storing cyber threat information processing program | |
US20240054210A1 (en) | Cyber threat information processing apparatus, cyber threat information processing method, and storage medium storing cyber threat information processing program | |
Huang et al. | {DONAPI}: Malicious {NPM} Packages Detector using Behavior Sequence Knowledge Mapping | |
Yin et al. | Automatic malware analysis: an emulator based approach | |
Gandotra et al. | Malware intelligence: beyond malware analysis | |
Zheng et al. | Towards robust detection of open source software supply chain poisoning attacks in industry environments | |
Huertas Celdrán et al. | Creation of a dataset modeling the behavior of malware affecting the confidentiality of data managed by IoT devices | |
Kono et al. | An unknown malware detection using execution registry access | |
Ramadan et al. | Redline Stealer Malware Analysis with Surface, Runtime, and Static Code Methods | |
Anand et al. | Malware Exposed: An In-Depth Analysis of its Behavior and Threats |