[go: up one dir, main page]

Li et al., 2013 - Google Patents

Detecting Infection Source and Building Predictive Blacklists with an Attack-Source Scoring System

Li et al., 2013

Document ID
2489980293135172146
Author
Li L
Memon N
Publication year
Publication venue
8th Annual Symposium on Information Assurance (ASIA’13)

External Links

Continue reading at scholar.google.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/568Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files

Similar Documents

Publication Publication Date Title
Mahjabin et al. A survey of distributed denial-of-service attack, prevention, and mitigation techniques
Alshamrani et al. A survey on advanced persistent threats: Techniques, solutions, challenges, and research opportunities
Almutairi et al. Hybrid botnet detection based on host and network analysis
Passerini et al. Fluxor: Detecting and monitoring fast-flux service networks
EP2147390B1 (en) Detection of adversaries through collection and correlation of assessments
Bailey et al. A survey of botnet technology and defenses
Khattak et al. A taxonomy of botnet behavior, detection, and defense
Choi et al. BotGAD: detecting botnets by capturing group activities in network traffic
Tyagi et al. A wide scale survey on botnet
Tsikerdekis et al. Approaches for preventing honeypot detection and compromise
Kang et al. Towards complete node enumeration in a peer-to-peer botnet
US9386031B2 (en) System and method for detection of targeted attacks
US9124617B2 (en) Social network protection system
Nguyen et al. DGA botnet detection using collaborative filtering and density-based clustering
Hindy et al. A taxonomy of malicious traffic for intrusion detection systems
Yu et al. Self-disciplinary worms and countermeasures: Modeling and analysis
Jeyanthi Internet of things (IoT) as interconnection of threats (IoT)
Wang et al. What you see predicts what you get—lightweight agent‐based malware detection
Lee et al. Tracking multiple C&C botnets by analyzing DNS traffic
Kukreti et al. DDoS attack using SYN flooding: A case study
Prasad et al. Flooding attacks to internet threat monitors (ITM): modeling and counter measures using botnet and honeypots
Zhang et al. A survey of defense against p2p botnets
US12255908B2 (en) Polymorphic non-attributable website monitor
Mendes et al. Analysis of iot botnet architectures and recent defense proposals
Panimalar et al. A review on taxonomy of botnet detection