AbstractMalicious software activities have become more and more clandestine, making them challenging to detect. Existing security solutions rely heavily on the recognition of known code or behavior signatures, which are incapable of detecting new malware patterns. We propose to discover the triggering relations on network requests and leverage the structural information to identify stealthy malware activities that cannot be attributed to a legitimate cause. The triggering relation is defined as the temporal and causal relationship between two events. We design and compare rule- and learning-based methods to infer the triggering relations on network data. We further introduce a user-intention based security policy for pinpointing stealthy ma...
Developing malware variants is extremely cheap for attackers because of the availability of various ...
International audienceCyber Security researchers are in an ongoing battle against ransomware attacks...
International audienceCyber Security researchers are in an ongoing battle against ransomware attacks...
AbstractMalicious software activities have become more and more clandestine, making them challenging...
Studies show that a significant portion of networked com-puters are infected with stealthy malware. ...
Monitoring network traffic and detecting anomalies are es-sential tasks that are carried out routine...
Abstract—This paper describes an approach to enforce depen-dencies between network traffic and user ...
Abstract—Malware is a major threat to security and privacy of network users. A huge variety of malwa...
International audienceMalware is a major threat to security and privacy of network users. A huge var...
This paper describes an approach to enforce dependencies between network traffic and user activities...
Malware is a major threat to security and privacy of network users. A huge variety of malware typica...
It is clearly in the interest of network administrators to detect hosts within their networks that a...
Malware is a major threat to security and privacy of network users. A huge variety of malware typica...
The task of generating network-based evidence to support network forensic investigation is becoming ...
Abstract-This paper describes an approach to enforce dependencies between network traffic and user a...
Developing malware variants is extremely cheap for attackers because of the availability of various ...
International audienceCyber Security researchers are in an ongoing battle against ransomware attacks...
International audienceCyber Security researchers are in an ongoing battle against ransomware attacks...
AbstractMalicious software activities have become more and more clandestine, making them challenging...
Studies show that a significant portion of networked com-puters are infected with stealthy malware. ...
Monitoring network traffic and detecting anomalies are es-sential tasks that are carried out routine...
Abstract—This paper describes an approach to enforce depen-dencies between network traffic and user ...
Abstract—Malware is a major threat to security and privacy of network users. A huge variety of malwa...
International audienceMalware is a major threat to security and privacy of network users. A huge var...
This paper describes an approach to enforce dependencies between network traffic and user activities...
Malware is a major threat to security and privacy of network users. A huge variety of malware typica...
It is clearly in the interest of network administrators to detect hosts within their networks that a...
Malware is a major threat to security and privacy of network users. A huge variety of malware typica...
The task of generating network-based evidence to support network forensic investigation is becoming ...
Abstract-This paper describes an approach to enforce dependencies between network traffic and user a...
Developing malware variants is extremely cheap for attackers because of the availability of various ...
International audienceCyber Security researchers are in an ongoing battle against ransomware attacks...
International audienceCyber Security researchers are in an ongoing battle against ransomware attacks...