[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Yang et al., 2016 - Google Patents

A multi-level feature extraction technique to detect moble botnet

Yang et al., 2016

Document ID
10933691937103557748
Author
Yang M
Wen Q
Publication year
Publication venue
2016 2nd IEEE International Conference on Computer and Communications (ICCC)

External Links

Snippet

Android malware detection has been heavily studied, which classical android malware detecting approaches are signature-based or behavior-based detection based on the files itself, but little attention has been directed to the network traffics generated by android …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image

Similar Documents

Publication Publication Date Title
US11783035B2 (en) Multi-representational learning models for static analysis of source code
US11323466B2 (en) Malicious HTTP cookies detection and clustering
Wang et al. Detecting android malware leveraging text semantics of network flows
US10853484B2 (en) Cookies watermarking in malware analysis
US11816214B2 (en) Building multi-representational learning models for static analysis of source code
Wang et al. Seeing through network-protocol obfuscation
CA2966408C (en) A system and method for network intrusion detection of covert channels based on off-line network traffic
US11636208B2 (en) Generating models for performing inline malware detection
US11374946B2 (en) Inline malware detection
WO2018076697A1 (en) Method and apparatus for detecting zombie feature
Zhang et al. ScanMe mobile: a cloud-based Android malware analysis service
Matoušek et al. On reliability of JA3 hashes for fingerprinting mobile applications
Gomez et al. Unsupervised detection and clustering of malicious tls flows
Singh et al. A comparative review of malware analysis and detection in HTTPs traffic
Yang et al. A multi-level feature extraction technique to detect moble botnet
JP2024023875A (en) Inline malware detection
Singh Classification of Malware in HTTPs Traffic Using Machine Learning Approach
Singh et al. RETRACTED: A hybrid layered architecture for detection and analysis of network based Zero-day attack
Woodiss-Field et al. Towards evaluating the effectiveness of botnet detection techniques
Alageel et al. EarlyCrow: Detecting APT malware command and control over HTTP (S) using contextual summaries
Su et al. Mobile traffic identification based on application's network signature
Ramos et al. A Machine Learning Based Approach to Detect Stealthy Cobalt Strike C &C Activities from Encrypted Network Traffic
Kim et al. HAS-Analyzer: Detecting HTTP-based C&C based on the Analysis of HTTP Activity Sets
Ahlgren Local And Network Ransomware Detection Comparison
Patel Mining Ransomware Signatures from Network Traffic