This paper presents the detection techniques of anomalous programs based on the analysis of their system call traces. We collect the API calls for the tested executable programs from Microsoft detour system and extract the features for our classification task using the previously established n-gram technique. We propose three different feature extraction approaches in this paper. These are frequency-based, time-based and a hybrid approach which actually combines the first two approaches. We use the well-known classifier algorithms in our experiments using WEKA interface to classify the malicious programs from the benign programs. Our empirical evidence demonstrates that the proposed feature extraction approaches can detect malicious program...
Part 9: Intrusion DetectionInternational audienceThe most common anomaly detection mechanisms at app...
This paper discusses our research in developing a generalized and systematic method for anomaly dete...
A serious security threat today is malicious executables, especially new, unseen malicious executabl...
This paper presents the detection techniques of anomalous programs based on the analysis of their sy...
One of the recent trends adopted by malware authors is to use packers or software tools that instiga...
Malware is a major security threat confronting computer systems and networks and has increased in sc...
In this paper, we propose a five-step approach to detect obfuscated malware by investigating the str...
In this paper, we propose a five-step approach to detect obfuscated malware by investigating the str...
International audienceIn recent years, the damage cost caused by malwares is huge. Thus, malware det...
Data-driven public security networking and computer systems are always under threat from malicious c...
The widespread development of the malware industry is considered the main threat to our e-society. T...
This paper proposes a new method of the malicious code classification based on statistical analysis ...
In the era of information technology and connected world, detecting malware has been a major securit...
In the era of ubiquitous sensors and smart devices, detecting malware is becoming an endless battle ...
Program anomaly detection — modeling normal program executions to detect deviations at runtime as cu...
Part 9: Intrusion DetectionInternational audienceThe most common anomaly detection mechanisms at app...
This paper discusses our research in developing a generalized and systematic method for anomaly dete...
A serious security threat today is malicious executables, especially new, unseen malicious executabl...
This paper presents the detection techniques of anomalous programs based on the analysis of their sy...
One of the recent trends adopted by malware authors is to use packers or software tools that instiga...
Malware is a major security threat confronting computer systems and networks and has increased in sc...
In this paper, we propose a five-step approach to detect obfuscated malware by investigating the str...
In this paper, we propose a five-step approach to detect obfuscated malware by investigating the str...
International audienceIn recent years, the damage cost caused by malwares is huge. Thus, malware det...
Data-driven public security networking and computer systems are always under threat from malicious c...
The widespread development of the malware industry is considered the main threat to our e-society. T...
This paper proposes a new method of the malicious code classification based on statistical analysis ...
In the era of information technology and connected world, detecting malware has been a major securit...
In the era of ubiquitous sensors and smart devices, detecting malware is becoming an endless battle ...
Program anomaly detection — modeling normal program executions to detect deviations at runtime as cu...
Part 9: Intrusion DetectionInternational audienceThe most common anomaly detection mechanisms at app...
This paper discusses our research in developing a generalized and systematic method for anomaly dete...
A serious security threat today is malicious executables, especially new, unseen malicious executabl...