Design for Zombie PCs and APT Attack Detection based on traffic analysis

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Polymorphic Malicious JavaScript Code Detection for APT Attack Defence

The majority of existing malware detection techniques detects malicious codes by identifying malicious behavior patterns. However, they have difficulty identifying new or modified malicious behaviors; consequently, new techniques that can effectively and accurately detect new malicious behaviors are crucial. This paper proposes a method that defines the malicious behaviors of malware using conc...

متن کامل

Detection and Isolation of Zombie Attack under Cloud Environment

Network security, data security and several other security types such as the computer security collectively compose the word “Cloud Security”. Cloud computing posses a new challenge because traditional security mechanism is being followed are insufficient to safeguard the cloud resources. Cloud computing can easily be targeted by the attackers. A group of malicious users or illegitimate users c...

متن کامل

Design an Intelligent Driver Assistance System Based On Traffic Sign Detection with Persian Context

In recent years due to improvements of technology within automobile industry, design process of advanced driver assistance systems for collision avoidance and traffic management has been investigated in both academics and industrial levels. Detection of traffic signs is an effective method to reach the mentioned aims. In this paper a new intelligent driver assistance system based on traffic...

متن کامل

Detecting Bot Networks Based On HTTP And TLS Traffic Analysis

Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...

متن کامل

Traffic Flow Analysis Based on Queuing Models

One of the most important issues in the plant layout design especially in mass production organizations with high inter-plant logistics is‘material flow and inter-plant traffic analysis and its effects on the production capabilities or pauses in production lines. In this paper the inter-plant traffic analysis issue on the basis of single channel queue model (M/M/1) is analyzed in a carmaker c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of the Korea Institute of Information Security and Cryptology

سال: 2014

ISSN: 1598-3986

DOI: 10.13089/jkiisc.2014.24.3.491