The method of detecting malware-infected hosts analyzing firewall and proxy logs

Kazunori Kamiya,Kazufumi Aoki, Kensuke Nakata,Toru Sato, Hiroshi Kurakami,Masaki Tanikawa

2015 10th Asia-Pacific Symposium on Information and Telecommunication Technologies (APSITT)(2015)

引用 2|浏览3
暂无评分
摘要
The number of security incidents is increasing and many of them are derived from malware activities. However, recent malware have become so sophisticated that commercial anti-virus software is not capable of detecting 100% of them. NTT Global Threat Intelligence Report shows that more than half of malware are not detected by commercial antivirus software [1]. Nowadays, post-infection countermeasure is important to minimize the damage caused by malware.
更多
查看译文
关键词
malware-infected host detection,firewall logs,proxy logs,TCP-IP,HTTP,malicious lists,dynamic analysis,network traffic logs
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要