Phantom Malware: Conceal Malicious Actions From Malware Detection Techniques by Imitating User Activity
نویسندگان
چکیده
منابع مشابه
Monitoring User Actions for Better Malware Specifications
We propose incorporating user actions to improve the precision of malware specifications and introduce a system to create effective application security policies based on the relationships between user interaction, GUI events, and run-time operations of both benign and malicious applications. Graphical malware such as Trojan:Win32/Fakeinit prevent us from simply allowing all user initiated acti...
متن کاملMalware Detection and Removal Techniques
Malwares are malignant softwares. It is designed to damage computer systems without the knowledge of the owner using the system. Softwares from reputable vendors also contain malicious code that affects the system or leaks informations to remote servers. Malwares includes computer viruses, Worms, spyware, dishonest ad-ware, rootkits, Trojans, dialers etc. Malware is one of the most serious secu...
متن کاملPavlos Lamprakis Human or malware ? Detection of malicious Web requests
Nowadays covert command and control (C&C) communication channels are built using the HTTP/HTTPS protocol, mainly because it is rarely blocked as well as malicious traffic can hide inside huge amounts of daily benign browsing traffic. This thesis addresses the problem of identifying malicious Web traffic and more specifically, post-infection traffic (C&C communication). We have built a system to...
متن کاملDetection of Malware and Malicious Executables Using E-Birch Algorithm
Malware detection is one of the challenges to the modern computing world. Web mining is the subset of data mining used to provide solutions for complex problems. Web intelligence is the new hope for the field of computer science to bring solution for the malware detection. Web mining is the method of web intelligence to make web as an intelligent tool to combat malware and phishing websites. Ge...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2020
ISSN: 2169-3536
DOI: 10.1109/access.2020.3021743