MALWARE DETECTION USING HONEYPOT AND MALWARE PREVENTION
نویسندگان
چکیده
منابع مشابه
DroidCheck: Android Malware Detection by Behavioral Techniques and Honeypot
Android, the name is quite enough to show its dominance in the mobile computing world. Android is now the market leader among all its competitors. As, it is the largest shareholder in the market it has become bull’s eye for the attackers. Security is one of the major concerns for android users today. It has become the most viable target of security threats. With the increase in power and featur...
متن کاملMalware Detection using Classification of Variable-Length Sequences
In this paper, a novel method based on the graph is proposed to classify the sequence of variable length as feature extraction. The proposed method overcomes the problems of the traditional graph with variable length of data, without fixing length of sequences, by determining the most frequent instructions and insertion the rest of instructions on the set of “other”, save speed and memory. Acco...
متن کاملClient Honeypot Based Malware Program Detection Embedded Into Web Pages
In today’s world where internet is hosting major resources of this world, the malware programs embedded into web pages have become a severe threat in today’s internet which launches the client side attacks by exploiting the browser based vulnerabilities. With the improvement of software security, vulnerabilities based attacks declined whereas the attacks based on the client side application is ...
متن کاملDetection and Prevention of New and Unknown Malware using Honeypots
Security has become ubiquitous in every domain today as newly emerging malware pose an everincreasing perilous threat to systems. Consequently, honeypots are fast emerging as an indispensible forensic tool for the analysis of malicious network traffic. Honeypots can be considered to be traps for hackers and intruders and are generally deployed complimentary to Intrusion Detection Systems (IDS) ...
متن کاملUsing IRP for Malware Detection
Run-time malware detection strategies are efficient and robust, which get more and more attention. In this paper, we use I/O Request Package (IRP) sequences for malware detection. N-gram will be used to analyze IRP sequences for feature extraction. Integrated use of Negative Selection Algorithm (NSA) and Positive Selection Algorithm (PSA), we get more than 96% true positive rate and 0% false po...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING AND TECHNOLOGY
سال: 2019
ISSN: 0976-6375,0976-6367
DOI: 10.34218/ijcet.10.6.2019.001