It is proposed the model of the hierarchical convolutional extractor of malware traffic features. Image with resolution 28x28 pixels and 10-th channels formed on the basis of successive 10 network packet flows is considered as model input. It allows to describe the spatial-temporal statistical characteristics of the traffic. The feature extractor consists of two convolutional layers with three-dimensional filters, sub-sampling layers, and activation calculation layers based on the orthogonal matching pursuit algorithm and the ReLU function. It is proposed the model of decision rules of the malware traffic detector based on information-extreme classifier. It allows to receive computatially simple decision rules and evaluate the informational...
Malicious attacks to software applications are on the rise as more people use Internet of things (Io...
To prevent detection, attackers frequently design systems to rearrange and rewrite their malware aut...
Detection of DDoS (Distributed Denial of Service) traffic is of great importance for the availabilit...
Since the last decade of the 20th century, the Internet had become flourishing, which drew great int...
Malware is one of the most serious threats to the Internet.The existing malware has huge data size a...
Performing large-scale malware classification is increasingly becoming a critical step in malware an...
Research in the field of malware classification often relies on machine learning models that are tra...
Content-based malware classification technique using n-gram features required high computational ove...
Abstract New and unseen polymorphic malware, zero-day attacks, or other types of advanced persistent...
Smartphone apps are closely integrated with our daily lives, and mobile malware has brought about se...
This research study mainly focused on the dynamic malware detection. Malware progressively changes, ...
Purpose. The article is aimed at the development of a methodology for detecting attacks on a compute...
Ever growing Internet causes the availability of information. However, it also provides a suitable s...
Recently, the amount of encrypted malicious network traffic masquerading as normal traffic of data h...
With the rising use of Internet technologies around the world, the number of network intruders and a...
Malicious attacks to software applications are on the rise as more people use Internet of things (Io...
To prevent detection, attackers frequently design systems to rearrange and rewrite their malware aut...
Detection of DDoS (Distributed Denial of Service) traffic is of great importance for the availabilit...
Since the last decade of the 20th century, the Internet had become flourishing, which drew great int...
Malware is one of the most serious threats to the Internet.The existing malware has huge data size a...
Performing large-scale malware classification is increasingly becoming a critical step in malware an...
Research in the field of malware classification often relies on machine learning models that are tra...
Content-based malware classification technique using n-gram features required high computational ove...
Abstract New and unseen polymorphic malware, zero-day attacks, or other types of advanced persistent...
Smartphone apps are closely integrated with our daily lives, and mobile malware has brought about se...
This research study mainly focused on the dynamic malware detection. Malware progressively changes, ...
Purpose. The article is aimed at the development of a methodology for detecting attacks on a compute...
Ever growing Internet causes the availability of information. However, it also provides a suitable s...
Recently, the amount of encrypted malicious network traffic masquerading as normal traffic of data h...
With the rising use of Internet technologies around the world, the number of network intruders and a...
Malicious attacks to software applications are on the rise as more people use Internet of things (Io...
To prevent detection, attackers frequently design systems to rearrange and rewrite their malware aut...
Detection of DDoS (Distributed Denial of Service) traffic is of great importance for the availabilit...