Sciweavers

205 search results - page 7 / 41
» Detecting algorithmically generated malicious domain names
Sort
View
ACSAC
2004
IEEE
14 years 9 days ago
RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates
One of the biggest obstacles faced by user command based anomaly detection techniques is the paucity of data. Gathering command data is a slow process often spanning months or yea...
Ramkumar Chinchani, Aarthie Muthukrishnan, Madhusu...
GECCO
2009
Springer
161views Optimization» more  GECCO 2009»
14 years 3 months ago
Are evolutionary rule learning algorithms appropriate for malware detection?
In this paper, we evaluate the performance of ten well-known evolutionary and non-evolutionary rule learning algorithms. The comparative study is performed on a real-world classiď...
M. Zubair Shafiq, S. Momina Tabish, Muddassar Faro...
GECCO
2009
Springer
162views Optimization» more  GECCO 2009»
14 years 1 months ago
On the appropriateness of evolutionary rule learning algorithms for malware detection
In this paper, we evaluate the performance of ten well-known evolutionary and non-evolutionary rule learning algorithms. The comparative study is performed on a real-world classiď...
M. Zubair Shafiq, S. Momina Tabish, Muddassar Faro...
CSFW
2004
IEEE
14 years 8 days ago
Using Active Learning in Intrusion Detection
Intrusion Detection Systems (IDSs) have become an important part of operational computer security. They are the last line of defense against malicious hackers and help detect ongo...
Magnus Almgren, Erland Jonsson
RAID
2010
Springer
13 years 7 months ago
Fast-Flux Bot Detection in Real Time
The fast-flux service network architecture has been widely adopted by bot herders to increase the productivity and extend the lifespan of botnets’ domain names. A fast-flux bot...
Ching-Hsiang Hsu, Chun-Ying Huang, Kuan-Ta Chen