Machine learning techniques are widely used in many fields. One of the applications of machine learning in the field of information security is classification of a computer behavior into malicious and benign. Antiviruses consisting of signature-based methods are helpless against new (unknown) computer worms. This paper focuses on the feasibility of accurately detecting unknown worm activity in individual computers while minimizing the required set of features collected from the monitored computer. A comprehensive experiment for testing the feasibility of detecting unknown computer worms, employing several computer configurations, background applications, and user activity, was performed. During the experiments 323 computer features were mon...
Since the days of the Morris worm, the spread of malicious code has been the most imminent menace to...
Anti-virus systems traditionally use signatures to detect malicious executables, but signatures are ...
Abstract: This paper surveys the Internet worms-related literature and how stealthy worm behaviour c...
Abstract—Detecting unknown malicious code (malcode) is a challenging task. Current common solutions,...
Computer worm detection has been a challenging and often elusive task. This is partly because of the...
In the Internet age, malicious software (malware) represents a serious threat to the security of inf...
Malicious software in form of Internet worms, computer viruses, and Trojan horses poses a major thre...
The scope of this research is computer worm detection. Computer worm has been defined as a process t...
Computer worms are a type of malicious malware that prey on networked machines. A number of differe...
The conference aimed at supporting and stimulating active productive research set to strengthen the ...
Internet worms pose a serious threat to computer security. Traditional approaches using signatures t...
<p>Network intrusion detection systems typically detect worms by examining packet or flow logs...
ABSTRACT\ud AN INVESTIGATION OF MACHINE LEARNING TECHNIQUES FOR\ud THE DETECTION OF UNKNOWN MALICIOU...
Active worms has been major security threat to the Internet. This is due to the ability of active wo...
Abstract: We present a worm detection system that leverages the reliability of IP-Flow and the effec...
Since the days of the Morris worm, the spread of malicious code has been the most imminent menace to...
Anti-virus systems traditionally use signatures to detect malicious executables, but signatures are ...
Abstract: This paper surveys the Internet worms-related literature and how stealthy worm behaviour c...
Abstract—Detecting unknown malicious code (malcode) is a challenging task. Current common solutions,...
Computer worm detection has been a challenging and often elusive task. This is partly because of the...
In the Internet age, malicious software (malware) represents a serious threat to the security of inf...
Malicious software in form of Internet worms, computer viruses, and Trojan horses poses a major thre...
The scope of this research is computer worm detection. Computer worm has been defined as a process t...
Computer worms are a type of malicious malware that prey on networked machines. A number of differe...
The conference aimed at supporting and stimulating active productive research set to strengthen the ...
Internet worms pose a serious threat to computer security. Traditional approaches using signatures t...
<p>Network intrusion detection systems typically detect worms by examining packet or flow logs...
ABSTRACT\ud AN INVESTIGATION OF MACHINE LEARNING TECHNIQUES FOR\ud THE DETECTION OF UNKNOWN MALICIOU...
Active worms has been major security threat to the Internet. This is due to the ability of active wo...
Abstract: We present a worm detection system that leverages the reliability of IP-Flow and the effec...
Since the days of the Morris worm, the spread of malicious code has been the most imminent menace to...
Anti-virus systems traditionally use signatures to detect malicious executables, but signatures are ...
Abstract: This paper surveys the Internet worms-related literature and how stealthy worm behaviour c...