نتایج جستجو برای: malicious

تعداد نتایج: 12653  

Journal: :IEICE Transactions on Information and Systems 2023

Different types of malicious attacks have been increasing simultaneously and become a serious issue for cybersecurity. Most leverage domain URLs as an attack communications medium compromise users into victim phishing or spam. We take advantage machine learning methods to detect the maliciousness automatically using three features: DNS-based, lexical, semantic features. The proposed approach ex...

2012
Xianglin Wei Tarem Ahmed Ming Chen Al-Sakib Khan Pathan

Many reputation management schemes have been introduced to assist peers in choosing trustworthy collaborators in P2P environments where honest peers coexist with malicious ones. These schemes indeed provide some useful information about the reliability of peers, but they still suffer from various attacks including slandering, collusion, etc. Consequently, it is crucial to be able to detect mali...

2003
István Zsolt Berta István Vajda

The user wishes to communicate with a remote partner over an insecure network using a terminal. Cryptographic algorithms running on the terminal may provide authenticity for the user’s messages. In this paper the problem of sending authentic messages from untrusted terminals is analyzed. If attackers are able to gain total control over the terminal, the user must consider the terminal a potenti...

2005
Andreas Hirt John Aycock

Zombie networks have been used for spamming and DDoS attacks. Worms have been designed to receive commands from their creator and update themselves automatically. But the combination of malware and powerful anonymous communication techniques has not been seen – yet. There is a growing body of research work on anonymous communication schemes, which are developed legitimately to allow people to c...

Journal: :Journal of Research and Practice in Information Technology 2007
Jianyun Xu Andrew H. Sung Srinivas Mukkamala Qingzhong Liu

The proliferation of malware (viruses, Trojans, and other malicious code) in recent years has presented a serious threat to individual users, enterprises, and organizations alike. Current static scanning techniques for malware detection have serious limitations; on the other hand, sandbox testing fails to provide a complete satisfactory solution either due to time constraints (e.g., time bombs ...

2008
Robert Moskovitch Yuval Elovici

The recent growth in Internet usage has motivated the creation of new malicious code for various purposes, including information warfare. Today’s signature-based anti-viruses can detect accurately known malicious code but are very limited in detecting new malicious code. New malicious codes are being created every day, and their number is expected to increase in the coming years. Recently, mach...

2006
Mark Howard

In the 24 months to December 2005 recorded incidents of malicious damage to property increased by eight per cent in NSW. This bulletin provides information about the nature of malicious damage to property incidents through a detailed analysis of police database records and narratives of incidents occurring in 2005. These data reveal that the most frequent targets of malicious damage are private...

2006
Mun Choon Chan Ee-Chien Chang Liming Lu Peng Song Ngiam

We study the impact of malicious synchronization on computer systems that serve customers periodically. Systems supporting automatic periodic updates are common in web servers providing regular news update, sports scores or stock quotes. Our study focuses on the possibility of launching an effective low rate attack on the server to degrade performance measured in terms of longer processing time...

Journal: :CoRR 2016
Zheng Wang

The Domain Name System (DNS) is a fundamental Internet infrastructure, which resolves billions of queries per day in support of global communications and commerce. The most common use of DNS is to map human-friendly domain names to machine-readable IP addresses.The DNS is designed based on the client-server model where stub resolver at the client side originates DNS query for some query name an...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید