Pastor et al., 2020 - Google Patents
Detection of encrypted cryptomining malware connections with machine and deep learningPastor et al., 2020
View PDF- Document ID
- 629762710374700819
- Author
- Pastor A
- Mozo A
- Vakaruk S
- Canavese D
- López D
- Regano L
- Gómez-Canaval S
- Lioy A
- Publication year
- Publication venue
- Ieee Access
External Links
Snippet
Nowadays, malware has become an epidemic problem. Among the attacks exploiting the computer resources of victims, one that has become usual is related to the massive amounts of computational resources needed for digital currency cryptomining. Cybercriminals steal …
- 238000001514 detection method 0 title abstract description 39
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01M—TESTING STATIC OR DYNAMIC BALANCE OF MACHINES OR STRUCTURES; TESTING STRUCTURES OR APPARATUS NOT OTHERWISE PROVIDED FOR
- G01M15/00—Testing of engines
- G01M15/04—Testing of internal-combustion engines, e.g. diagnostic testing of piston engines
- G01M15/12—Testing of internal-combustion engines, e.g. diagnostic testing of piston engines by monitoring vibrations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Pastor et al. | Detection of encrypted cryptomining malware connections with machine and deep learning | |
| Moustafa | A new distributed architecture for evaluating AI-based security systems at the edge: Network TON_IoT datasets | |
| Xing et al. | Survey on botnet detection techniques: Classification, methods, and evaluation | |
| Lima Filho et al. | Smart detection: an online approach for DoS/DDoS attack detection using machine learning | |
| Meng et al. | Enhancing the security of blockchain-based software defined networking through trust-based traffic fusion and filtration | |
| US11856013B2 (en) | Method and system for detecting lateral movement in enterprise computer networks | |
| Rizvi et al. | Application of artificial intelligence to network forensics: Survey, challenges and future directions | |
| Om Kumar et al. | Detecting and confronting flash attacks from IoT botnets: CU Om Kumar, PRK Sathia Bhama | |
| Kartaltepe et al. | Social network-based botnet command-and-control: emerging threats and countermeasures | |
| Prajisha et al. | An efficient intrusion detection system for MQTT-IoT using enhanced chaotic salp swarm algorithm and LightGBM: C. Prajisha, AR Vasudevan | |
| US20250286903A1 (en) | Enhanced encrypted traffic analysis via integrated entropy estimation and neural network-based feature hybridization | |
| Memos et al. | A secure network model against bot attacks in edge-enabled industrial Internet of Things | |
| Batool et al. | [Retracted] Lightweight Statistical Approach towards TCP SYN Flood DDoS Attack Detection and Mitigation in SDN Environment | |
| Zeleke et al. | Efficient intrusion detection system for SDN orchestrated Internet of Things | |
| Li et al. | Towards blockchained challenge-based collaborative intrusion detection | |
| Qin et al. | Symmetry degree measurement and its applications to anomaly detection | |
| Haddadi et al. | Botnet behaviour analysis: How would a data analytics‐based system with minimum a priori information perform? | |
| Gurung et al. | Cids: Collaborative intrusion detection system using blockchain technology | |
| Sefati et al. | A comprehensive survey of cybersecurity techniques based on quality of service (QoS) on the Internet of Things (IoT) | |
| Ahmed et al. | A Systematic Literature Review on Cyber Attack Detection in Software-Define Networking (SDN) | |
| Hayawi et al. | A false positive resilient distributed trust management framework for collaborative intrusion detection systems | |
| Li et al. | Network Security | |
| Conti et al. | Distributed services attestation in IoT | |
| Rai et al. | Intrusion detection systems: A review | |
| Al-Mousa et al. | cl-CIDPS: A cloud computing based cooperative intrusion detection and prevention system framework |