This paper will look at the current state of visualization in relation to mainly malware collector logs, network logs and the possibility of visualizing their payloads. We will show that this type of visualization of activity on the network can help us in the forensic investigation of the traffic, which may contain unwanted pieces of cod, and may identify any patterns within the traffic or payloads that might help us determine the nature of the traffic visually. We will further speculate on a framework that could be built which would be able to finger print any type of malware, based on the theory that the basic structure of Malware code does not change, it may mutate but the internal structure stays the same. By passing it through either a...
With the explosion of Internet of Things (IoT) worldwide, there is an increasing threat from malicio...
Several methods have been devised by researchers to facilitate malware analysis and one of them is t...
The Internet is quickly becoming entrenched in the communication and commercial sectors of everyday ...
This paper will look at the current state of visualization in relation to mainly malware collector l...
Today enormous logging data monitoring the traffics of the Internet is generated everyday. However,...
Due to the increasing threat from malicious software (malware), monitoring of vulnerable systems is ...
Today, enormous logging data monitoring the traffics of the Internet is generated everyday. However,...
Malicious applications are usually comprehended through two major techniques, namely static and dyna...
Abstract—Network forensics is the critical next step in the analysis of network attacks, intrusions,...
Figure 1: The overview of web-based visualization tool for analyzing the network and system anomalie...
Despite several years of intensive study, intrusion detection systems still suffer from a key defici...
Any programme or code that is damaging to our systems or networks is known as Malware or malicious s...
Malicious software, known as malware, is a perpetual game of cat and mouse between malicious softwar...
To ensure the normal operation of a large computer network system, the common practice is to constan...
With the ever increasing use of computers for critical systems, computer security, the protection of...
With the explosion of Internet of Things (IoT) worldwide, there is an increasing threat from malicio...
Several methods have been devised by researchers to facilitate malware analysis and one of them is t...
The Internet is quickly becoming entrenched in the communication and commercial sectors of everyday ...
This paper will look at the current state of visualization in relation to mainly malware collector l...
Today enormous logging data monitoring the traffics of the Internet is generated everyday. However,...
Due to the increasing threat from malicious software (malware), monitoring of vulnerable systems is ...
Today, enormous logging data monitoring the traffics of the Internet is generated everyday. However,...
Malicious applications are usually comprehended through two major techniques, namely static and dyna...
Abstract—Network forensics is the critical next step in the analysis of network attacks, intrusions,...
Figure 1: The overview of web-based visualization tool for analyzing the network and system anomalie...
Despite several years of intensive study, intrusion detection systems still suffer from a key defici...
Any programme or code that is damaging to our systems or networks is known as Malware or malicious s...
Malicious software, known as malware, is a perpetual game of cat and mouse between malicious softwar...
To ensure the normal operation of a large computer network system, the common practice is to constan...
With the ever increasing use of computers for critical systems, computer security, the protection of...
With the explosion of Internet of Things (IoT) worldwide, there is an increasing threat from malicio...
Several methods have been devised by researchers to facilitate malware analysis and one of them is t...
The Internet is quickly becoming entrenched in the communication and commercial sectors of everyday ...