The method of detecting malware-infected hosts analyzing firewall and proxy logs
2015 10th Asia-Pacific Symposium on Information and Telecommunication Technologies (APSITT)(2015)
摘要
The number of security incidents is increasing and many of them are derived from malware activities. However, recent malware have become so sophisticated that commercial anti-virus software is not capable of detecting 100% of them. NTT Global Threat Intelligence Report shows that more than half of malware are not detected by commercial antivirus software [1]. Nowadays, post-infection countermeasure is important to minimize the damage caused by malware.
更多查看译文
关键词
malware-infected host detection,firewall logs,proxy logs,TCP-IP,HTTP,malicious lists,dynamic analysis,network traffic logs
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要