Sciweavers

191 search results - page 29 / 39
» On Detecting Camouflaging Worm
Sort
View
DSN
2008
IEEE
14 years 4 months ago
AGIS: Towards automatic generation of infection signatures
An important yet largely uncharted problem in malware defense is how to automate generation of infection signatures for detecting compromised systems, i.e., signatures that charac...
Zhuowei Li, XiaoFeng Wang, Zhenkai Liang, Michael ...
ACSAC
2006
IEEE
14 years 3 months ago
Back to the Future: A Framework for Automatic Malware Removal and System Repair
Malware is software with malicious intent. Besides viruses and worms, spyware, adware, and other newer forms of malware have recently emerged as widely-spread threats to system se...
Francis Hsu, Hao Chen, Thomas Ristenpart, Jason Li...
DMIN
2006
111views Data Mining» more  DMIN 2006»
13 years 11 months ago
Profiling and Clustering Internet Hosts
Identifying groups of Internet hosts with a similar behavior is very useful for many applications of Internet security control, such as DDoS defense, worm and virus detection, dete...
Songjie Wei, Jelena Mirkovic, Ezra Kissel
HUMAN
2003
Springer
14 years 3 months ago
A Study on Monitoring and Protecting Computer System against Interception Threat
Perfect protection against all system threats is considered to be impossible. The problem of monitoring against the threats has been an issue in literature, but its progress has no...
Seongje Cho, Chulyean Chang, Joonmo Kim, Jongmoo C...
DIMVA
2004
13 years 11 months ago
LIV - The Linux Integrated Viruswall
This paper presents a system developed in Linux aiming the protection of local area networks containing Windows workstations against malicious agents. The developed solution, named...
Teobaldo A. Dantas de Medeiros, Paulo S. Motta Pir...