The scope of this research is computer worm detection. Computer worm has been defined as a process that can cause a possibly evolved copy of it to execute on a remote computer. It does not require human intervention to propagate neither does it attach itself to an existing computer file. It spreads very rapidly. Modern computer worm authors obfuscate the code to make it difficult to detect the computer worm. This research proposes to use machine learning methodology for the detection of computer worms. More specifically, ensembles are used. The research deviates from existing detection approaches by using dark space network traffic attributed to an actual worm attack to train and validate the machine learning algorithms. It is also obtained...
Computer worm detection has been a challenging and often elusive task. This is partly because of the...
Morris worm showed the Internet community for the first time in 1988 that a worm could bring the Int...
Malware developers continually attempt to modify the execution pattern of malicious code hiding it i...
The conference aimed at supporting and stimulating active productive research set to strengthen the ...
Active worms has been major security threat to the Internet. This is due to the ability of active wo...
Since the days of the Morris worm, the spread of malicious code has been the most imminent menace to...
Machine learning techniques are widely used in many fields. One of the applications of machine learn...
<p>Network intrusion detection systems typically detect worms by examining packet or flow logs...
Due to their rapid spread, computer worms perform harmful tasks in networks, posing a security risk;...
Self-duplicating, self-propagating malicious codes known as computer worms spread themselves without...
Self-duplicating, self-propagating malicious codes known as computer worms spread themselves without...
Computer worms are a type of malicious malware that prey on networked machines. A number of differe...
Network intrusion detection systems typically detect worms by examining packet or flow logs for know...
In this paper we describe the main ensemble learning techniques and their application in the cyberse...
Abstract: We present a worm detection system that leverages the reliability of IP-Flow and the effec...
Computer worm detection has been a challenging and often elusive task. This is partly because of the...
Morris worm showed the Internet community for the first time in 1988 that a worm could bring the Int...
Malware developers continually attempt to modify the execution pattern of malicious code hiding it i...
The conference aimed at supporting and stimulating active productive research set to strengthen the ...
Active worms has been major security threat to the Internet. This is due to the ability of active wo...
Since the days of the Morris worm, the spread of malicious code has been the most imminent menace to...
Machine learning techniques are widely used in many fields. One of the applications of machine learn...
<p>Network intrusion detection systems typically detect worms by examining packet or flow logs...
Due to their rapid spread, computer worms perform harmful tasks in networks, posing a security risk;...
Self-duplicating, self-propagating malicious codes known as computer worms spread themselves without...
Self-duplicating, self-propagating malicious codes known as computer worms spread themselves without...
Computer worms are a type of malicious malware that prey on networked machines. A number of differe...
Network intrusion detection systems typically detect worms by examining packet or flow logs for know...
In this paper we describe the main ensemble learning techniques and their application in the cyberse...
Abstract: We present a worm detection system that leverages the reliability of IP-Flow and the effec...
Computer worm detection has been a challenging and often elusive task. This is partly because of the...
Morris worm showed the Internet community for the first time in 1988 that a worm could bring the Int...
Malware developers continually attempt to modify the execution pattern of malicious code hiding it i...