Li et al., 2013 - Google Patents
Detecting Infection Source and Building Predictive Blacklists with an Attack-Source Scoring SystemLi et al., 2013
- Document ID
- 2489980293135172146
- Author
- Li L
- Memon N
- Publication year
- Publication venue
- 8th Annual Symposium on Information Assurance (ASIA’13)
External Links
- 201000009910 diseases by infectious agent 0 title abstract description 35
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/568—Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mahjabin et al. | A survey of distributed denial-of-service attack, prevention, and mitigation techniques | |
Alshamrani et al. | A survey on advanced persistent threats: Techniques, solutions, challenges, and research opportunities | |
Almutairi et al. | Hybrid botnet detection based on host and network analysis | |
Passerini et al. | Fluxor: Detecting and monitoring fast-flux service networks | |
EP2147390B1 (en) | Detection of adversaries through collection and correlation of assessments | |
Bailey et al. | A survey of botnet technology and defenses | |
Khattak et al. | A taxonomy of botnet behavior, detection, and defense | |
Choi et al. | BotGAD: detecting botnets by capturing group activities in network traffic | |
Tyagi et al. | A wide scale survey on botnet | |
Tsikerdekis et al. | Approaches for preventing honeypot detection and compromise | |
Kang et al. | Towards complete node enumeration in a peer-to-peer botnet | |
US9386031B2 (en) | System and method for detection of targeted attacks | |
US9124617B2 (en) | Social network protection system | |
Nguyen et al. | DGA botnet detection using collaborative filtering and density-based clustering | |
Hindy et al. | A taxonomy of malicious traffic for intrusion detection systems | |
Yu et al. | Self-disciplinary worms and countermeasures: Modeling and analysis | |
Jeyanthi | Internet of things (IoT) as interconnection of threats (IoT) | |
Wang et al. | What you see predicts what you get—lightweight agent‐based malware detection | |
Lee et al. | Tracking multiple C&C botnets by analyzing DNS traffic | |
Kukreti et al. | DDoS attack using SYN flooding: A case study | |
Prasad et al. | Flooding attacks to internet threat monitors (ITM): modeling and counter measures using botnet and honeypots | |
Zhang et al. | A survey of defense against p2p botnets | |
US12255908B2 (en) | Polymorphic non-attributable website monitor | |
Mendes et al. | Analysis of iot botnet architectures and recent defense proposals | |
Panimalar et al. | A review on taxonomy of botnet detection |