Detecting malicious activities with user-agent-based profiles

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detecting malicious activities with user-agent-based profiles

Hypertext transfer protocol (HTTP) has become the main protocol to carry out malicious activities. Attackers typically use HTTP for communication with command-and-control servers, click fraud, phishing and other malicious activities, as they can easily hide among the large amount of benign HTTP traffic. The useragent (UA) field in the HTTP header carries information on the application, operatin...

متن کامل

A Agent-based Mining of User Profiles for E-services

An electronic service (e-service) can be defined as a collection of network-resident software programs that collaborate for supporting users in both accessing and selecting data and services of their interest present in a provider site. Examples of e-services are e-commerce, e-learning, and e-government applications. E-services are undoubtedly one of the engines presently supporting the Interne...

متن کامل

Detecting malicious JavaScript

The increased use of the World Wide Web and JavaScript as a scripting language for Web pages have made JavaScript a popular attack vector for infecting users' machines with malware. Additionally, attackers often obfuscate their code to avoid detection, which heightens the challenge and complexity of automated defense systems. We present two analyses of malicious scripts and suggest how they cou...

متن کامل

Agent-Based Network Protection Against Malicious Code

This paper presents an agent-based approach to Network Intrusion Prevention on corporate networks, emphasizing the protection from fast-spreading mobile malicious code outbreaks (e.g. worms) and related threats. Agents are not only used as a system-integration platform, but we use modern agent approaches to trust modeling and distributed task allocation to efficiently detect and also counter th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Network Management

سال: 2015

ISSN: 1055-7148

DOI: 10.1002/nem.1900