SOM with Vulture Fest Model Discovers Feral Malware and Visually Profiles the Security of Subnets
نویسندگان
چکیده
We propose a model for using firewall log entries of denied inbound Internet traffic for indirect discovery of local IP addresses that have security problems. This method is used successfully to discover computers with security problems on a network. A hexagonal SelfOrganizing Map then illustrates the network landscape of wireless traffic comparing it with malicious traffic and contrasting it to traditional traffic.
منابع مشابه
Visualization of Network Security Traffic using Hexagonal Self-Organizing Maps
A hexagonal Self-Organising Map (SOM) based on the Vulture Fest Model of intrusion detection illustrates the network landscape of wireless traffic comparing it with malicious traffic and contrasting it to traditional landline network traffic. This map can also provide visual security profiles of work groups and LAN administrators.
متن کاملDyVSoR: dynamic malware detection based on extracting patterns from value sets of registers
To control the exponential growth of malware files, security analysts pursue dynamic approaches that automatically identify and analyze malicious software samples. Obfuscation and polymorphism employed by malwares make it difficult for signature-based systems to detect sophisticated malware files. The dynamic analysis or run-time behavior provides a better technique to identify the threat. In t...
متن کاملDistribution Modeling of Foraging Habitats for Egyptian Vulture (Neophron percnopterus) in Kermanshah Province, Iran
The Egyptian vulture, Neophron percnopterus, as a globally endangered species, is significantly affected by conflicts with human, leading to the decline of this species population. Availability of food resources is known as one of the most important factors affecting the distribution of the Egyptian vulture. In this study, we employed an ensemble modelling approach to predict the suitability o...
متن کاملA Novel Hybrid Approach for Email Spam Detection based on Scatter Search Algorithm and K-Nearest Neighbors
Because cyberspace and Internet predominate in the life of users, in addition to business opportunities and time reductions, threats like information theft, penetration into systems, etc. are included in the field of hardware and software. Security is the top priority to prevent a cyber-attack that users should initially be detecting the type of attacks because virtual environments are not moni...
متن کاملDesign Hybrid method for intrusion detection using Ensemble cluster classification and SOM network
In current scenario of internet technology security is big challenge. Internet network threats by various cyber-attack and loss the system data and degrade the performance of host computer. In this sense intrusion detection are challenging field of research in concern of network security based on firewall and some rule based detection technique. In this paper we proposed an Ensemble Cluster Cla...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- I. J. Comput. Appl.
دوره 17 شماره
صفحات -
تاریخ انتشار 2010