We present an architecture for detecting "zero-day" worms and viruses in incoming email. Our main idea is to intercept every incoming message, pre-scan it for potentially dangerous attachments, and only deliver messages that are deemed safe. Unlike traditional scanning techniques that rely on some form of pattern matching (signatures), we use behavior-based anomaly detection. Under our approach, we "open" all suspicious attachments inside an instrumented virtual machine looking for dangerous actions, such as writing to the Windows registry, and flag suspicious messages. The attachment processing can be offloaded to a cluster of ancillary machines (as many as are needed to keep up with a site's email load), thus not imposing any computationa...
Vulnerabilities within antivirus engines deployed at a mail server represent a serious risk to the s...
Internet worms are self-replicating malware programs that use the Internet to replicate themselves a...
As next-generation computer worms may spread within minutes to millions of hosts, protection via hum...
Abstract. We present an architecture for detecting “zero-day ” worms and viruses in incoming email. ...
Abstract — Email worms comprise the largest portion of Internet worms today. Previous research has s...
The ability of worms to spread at rates that effectively preclude human-directed reaction has elevat...
Malware is software code that has malicious intent. In recent years, there have beenhuge changes in ...
Abstract Email has evolved to be a convenient and important communication media. It greatly facilita...
Computer systems continue to be at risk of attack by malicious software that are attached to email. ...
The ability of worms to spread at rates that effectively preclude human-directed reaction has elevat...
The Email Mining Toolkit (EMT) is a data mining system that computes behavior profiles or models of ...
Abstract- This paper describes a framework for detecting self-propagating email viruses based on det...
We introduce the Email Mining Toolkit (EMT), a system that implements behavior-based methods to impr...
Abstract — We have witnessed the release of multiple viruses and worms in a few years. Some of these...
New features of the PAYL anomalous payload detection sensor are demonstrated to accurately detect an...
Vulnerabilities within antivirus engines deployed at a mail server represent a serious risk to the s...
Internet worms are self-replicating malware programs that use the Internet to replicate themselves a...
As next-generation computer worms may spread within minutes to millions of hosts, protection via hum...
Abstract. We present an architecture for detecting “zero-day ” worms and viruses in incoming email. ...
Abstract — Email worms comprise the largest portion of Internet worms today. Previous research has s...
The ability of worms to spread at rates that effectively preclude human-directed reaction has elevat...
Malware is software code that has malicious intent. In recent years, there have beenhuge changes in ...
Abstract Email has evolved to be a convenient and important communication media. It greatly facilita...
Computer systems continue to be at risk of attack by malicious software that are attached to email. ...
The ability of worms to spread at rates that effectively preclude human-directed reaction has elevat...
The Email Mining Toolkit (EMT) is a data mining system that computes behavior profiles or models of ...
Abstract- This paper describes a framework for detecting self-propagating email viruses based on det...
We introduce the Email Mining Toolkit (EMT), a system that implements behavior-based methods to impr...
Abstract — We have witnessed the release of multiple viruses and worms in a few years. Some of these...
New features of the PAYL anomalous payload detection sensor are demonstrated to accurately detect an...
Vulnerabilities within antivirus engines deployed at a mail server represent a serious risk to the s...
Internet worms are self-replicating malware programs that use the Internet to replicate themselves a...
As next-generation computer worms may spread within minutes to millions of hosts, protection via hum...