SOM with Vulture Fest Model Discovers Feral Malware and Visually Profiles the Security of Subnets

نویسندگان

  • Chet Langin
  • Dunren Che
  • Michael Wainer
  • Shahram Rahimi
چکیده

We propose a model for using firewall log entries of denied inbound Internet traffic for indirect discovery of local IP addresses that have security problems. This method is used successfully to discover computers with security problems on a network. A hexagonal SelfOrganizing Map then illustrates the network landscape of wireless traffic comparing it with malicious traffic and contrasting it to traditional traffic.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Visualization of Network Security Traffic using Hexagonal Self-Organizing Maps

A hexagonal Self-Organising Map (SOM) based on the Vulture Fest Model of intrusion detection illustrates the network landscape of wireless traffic comparing it with malicious traffic and contrasting it to traditional landline network traffic. This map can also provide visual security profiles of work groups and LAN administrators.

متن کامل

DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers

To control the exponential growth of malware files, security analysts pursue dynamic approaches that automatically identify and analyze malicious software samples. Obfuscation and polymorphism employed by malwares make it difficult for signature-based systems to detect sophisticated malware files. The dynamic analysis or run-time behavior provides a better technique to identify the threat. In t...

متن کامل

Distribution Modeling of Foraging Habitats for Egyptian Vulture (Neophron percnopterus) in Kermanshah Province, Iran

The Egyptian vulture, Neophron percnopterus, as a globally endangered species, is significantly affected by conflicts with human, leading to the decline of this species population. Availability of food resources is known as one of the most important factors affecting the distribution of the Egyptian vulture. In this study, we employed an ensemble modelling approach to predict the  suitability o...

متن کامل

A Novel Hybrid Approach for Email Spam Detection based on Scatter Search Algorithm and K-Nearest Neighbors

Because cyberspace and Internet predominate in the life of users, in addition to business opportunities and time reductions, threats like information theft, penetration into systems, etc. are included in the field of hardware and software. Security is the top priority to prevent a cyber-attack that users should initially be detecting the type of attacks because virtual environments are not moni...

متن کامل

Design Hybrid method for intrusion detection using Ensemble cluster classification and SOM network

In current scenario of internet technology security is big challenge. Internet network threats by various cyber-attack and loss the system data and degrade the performance of host computer. In this sense intrusion detection are challenging field of research in concern of network security based on firewall and some rule based detection technique. In this paper we proposed an Ensemble Cluster Cla...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • I. J. Comput. Appl.

دوره 17  شماره 

صفحات  -

تاریخ انتشار 2010