[go: up one dir, main page]

Gandotra et al., 2019 - Google Patents

Malware intelligence: beyond malware analysis

Gandotra et al., 2019

Document ID
13401751406857843397
Author
Gandotra E
Bansal D
Sofat S
Publication year
Publication venue
International Journal of Advanced Intelligence Paradigms

External Links

Snippet

A number of malware samples are available online but a little research has attempted to thoroughly analyse these for obtaining insights or intelligence about their behavioural trends, which can further be used to issue early warnings about future threats. In this paper …
Continue reading at www.inderscienceonline.com (other versions)

Similar Documents

Publication Publication Date Title
US11277423B2 (en) Anomaly-based malicious-behavior detection
US20220371621A1 (en) Stateful rule generation for behavior based threat detection
Roseline et al. A comprehensive survey of tools and techniques mitigating computer and mobile malware attacks
Kharaz et al. {UNVEIL}: A {Large-Scale}, automated approach to detecting ransomware
US10581879B1 (en) Enhanced malware detection for generated objects
Jang et al. Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information
EP3531329B1 (en) Anomaly-based-malicious-behavior detection
Talukder Tools and techniques for malware detection and analysis
US10122742B1 (en) Classifying software modules based on comparisons using a neighborhood distance metric
JP2019082989A (en) Systems and methods of cloud detection, investigation and elimination of targeted attacks
US12056237B2 (en) Analysis of historical network traffic to identify network vulnerabilities
US20070107058A1 (en) Intrusion detection using dynamic tracing
Huang et al. {DONAPI}: Malicious {NPM} Packages Detector using Behavior Sequence Knowledge Mapping
Čeponis et al. Towards a robust method of dataset generation of malicious activity for anomaly-based HIDS training and presentation of AWSCTD dataset
Kim et al. WebMon: ML-and YARA-based malicious webpage detection
US12524523B2 (en) Cyber threat information processing apparatus, cyber threat information processing method, and storage medium storing cyber threat information processing program
US20240054215A1 (en) Cyber threat information processing apparatus, cyber threat information processing method, and storage medium storing cyber threat information processing program
Luh et al. AIDIS: Detecting and classifying anomalous behavior in ubiquitous kernel processes
Zheng et al. Towards robust detection of open source software supply chain poisoning attacks in industry environments
Gandotra et al. Malware intelligence: beyond malware analysis
Yin et al. Automatic malware analysis: an emulator based approach
Huertas Celdrán et al. Creation of a dataset modeling the behavior of malware affecting the confidentiality of data managed by IoT devices
US12368731B2 (en) Cyber threat information processing apparatus, cyber threat information processing method, and storage medium storing cyber threat information processing program
Ramadan et al. Redline stealer malware analysis with surface, runtime, and static code methods
Anand et al. Malware Exposed: An In-Depth Analysis of its Behavior and Threats