نتایج جستجو برای: malicious
تعداد نتایج: 12653 فیلتر نتایج به سال:
Different types of malicious attacks have been increasing simultaneously and become a serious issue for cybersecurity. Most leverage domain URLs as an attack communications medium compromise users into victim phishing or spam. We take advantage machine learning methods to detect the maliciousness automatically using three features: DNS-based, lexical, semantic features. The proposed approach ex...
Many reputation management schemes have been introduced to assist peers in choosing trustworthy collaborators in P2P environments where honest peers coexist with malicious ones. These schemes indeed provide some useful information about the reliability of peers, but they still suffer from various attacks including slandering, collusion, etc. Consequently, it is crucial to be able to detect mali...
The user wishes to communicate with a remote partner over an insecure network using a terminal. Cryptographic algorithms running on the terminal may provide authenticity for the user’s messages. In this paper the problem of sending authentic messages from untrusted terminals is analyzed. If attackers are able to gain total control over the terminal, the user must consider the terminal a potenti...
Zombie networks have been used for spamming and DDoS attacks. Worms have been designed to receive commands from their creator and update themselves automatically. But the combination of malware and powerful anonymous communication techniques has not been seen – yet. There is a growing body of research work on anonymous communication schemes, which are developed legitimately to allow people to c...
The proliferation of malware (viruses, Trojans, and other malicious code) in recent years has presented a serious threat to individual users, enterprises, and organizations alike. Current static scanning techniques for malware detection have serious limitations; on the other hand, sandbox testing fails to provide a complete satisfactory solution either due to time constraints (e.g., time bombs ...
The recent growth in Internet usage has motivated the creation of new malicious code for various purposes, including information warfare. Today’s signature-based anti-viruses can detect accurately known malicious code but are very limited in detecting new malicious code. New malicious codes are being created every day, and their number is expected to increase in the coming years. Recently, mach...
In the 24 months to December 2005 recorded incidents of malicious damage to property increased by eight per cent in NSW. This bulletin provides information about the nature of malicious damage to property incidents through a detailed analysis of police database records and narratives of incidents occurring in 2005. These data reveal that the most frequent targets of malicious damage are private...
We study the impact of malicious synchronization on computer systems that serve customers periodically. Systems supporting automatic periodic updates are common in web servers providing regular news update, sports scores or stock quotes. Our study focuses on the possibility of launching an effective low rate attack on the server to degrade performance measured in terms of longer processing time...
The Domain Name System (DNS) is a fundamental Internet infrastructure, which resolves billions of queries per day in support of global communications and commerce. The most common use of DNS is to map human-friendly domain names to machine-readable IP addresses.The DNS is designed based on the client-server model where stub resolver at the client side originates DNS query for some query name an...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید