نتایج جستجو برای: malicious

تعداد نتایج: 12653  

2013
Tsung-Chuan Chen Chieh Ho

Malicious users on chat network systems would reduce the willingness of benevolent users to chat on the same network. Thus it is often desirable to classify malicious users based on their personal profile and chat contents. In this study, different algorithms including Naive Bayes, SVM, Decision Table, Multilayer Perceptron, and Logistic classification are applied on the dataset from an anonymo...

Journal: :JIPS 2013
Young Sup Hwang Jin Baek Kwon Jae Chan Moon Seong Je Cho

In order to classify a web page as being benign or malicious, we designed 14 basic and 16 extended features. The basic features that we implemented were selected to represent the essential characteristics of a web page. The system heuristically combines two basic features into one extended feature in order to effectively distinguish benign and malicious pages. The support vector machine can be ...

2010
Umar Manzoor Samia Nefti-Meziani Yacine Rezgui

Computer networks today are far more complex and managing such networks is not more then a job of an expert. Monitoring systems helps network administrator in monitoring and protecting the network by not allowing the users to run illegal application or changing the configuration of the network node. In this paper, we have proposed Autonomous Malicious Activity Inspector – AMAI which uses ontolo...

2007
David Brumley Cody Hartwig Min Gyung Kang Zhenkai Liang James Newsome Pongsin Poosankam Dawn Song Heng Yin

Automatic analysis of malicious binaries is necessary in order to scale with the rapid development and recovery of malware found in the wild. The results of automatic analysis are useful for creating defense systems and understanding the current capabilities of attackers. We propose an approach for automatic dissection of malicious binaries which can answer fundamental questions such as what be...

Journal: :IET Information Security 2014
Riham AlTawy Amr M. Youssef

In August 2012, the Streebog hash function was selected as the new Russian cryptographic hash standard (GOST R 34.11-2012). In this paper, we investigate the new standard in the context of malicious hashing and present a practical collision for a malicious version of the full hash function. In particular, we apply the rebound attack to find three solutions for three different differential paths...

2012
Theodoros Lappas

Product reviews have been the focus of numerous research efforts. In particular, the problem of identifying fake reviews has recently attracted significant interest. Writing fake reviews is a form of attack, performed to purposefully harm or boost an item’s reputation. The effective identification of such reviews is a fundamental problem that affects the performance of virtually every applicati...

Journal: :Applied Ontology 2016
André Ricardo Abed Grégio Rodrigo Bonacin Antonio Carlos de Marchi Olga Nabuco Paulo Lício de Geus

–Malicious programs have been the main actors in complex, sophisticated attacks against nations, governments, diplomatic agencies, private institutions and people. Knowledge about malicious program behavior forms the basis for constructing more secure information systems. In this article, we introduce MBO, a Malicious Behavior Ontology that represents complex behaviors of suspicious executions,...

2015
Neha Roy

In Vehicular Ad hoc Networks (VANETs), vehicles periodically broadcast messages for every 100 to 300 milli seconds. Such messages are used to report a safety or non-safety application. Authentication on such safety messages assures the end users in the network. However, a malicious vehicle can trace the messages and can launch varied types of malicious activity which leads to the compromise of ...

2006
Payman Mohassel Matthew K. Franklin

We study efficiency tradeoffs for secure two-party computation in presence of malicious behavior. We investigate two main approaches for defending against malicious behavior in Yao’s garbled circuit method: (1) Committed-input scheme, (2) Equality-checker scheme. We provide asymptotic and concrete analysis of communication and computation costs of the designed protocols. We also develop a weake...

2004
Tony Abou-Assaleh Nick Cercone Vlado Keselj Ray Sweidan

Signature-based malicious code detection is the standard technique in all commercial anti-virus software. This method can detect a virus only after the virus has appeared and caused damage. Signature-based detection performs poorly when attempting to identify new viruses. Motivated by the standard signature-based technique for detecting viruses, and a recent successful text classification metho...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید