[go: up one dir, main page]

Pastor et al., 2020 - Google Patents

Detection of encrypted cryptomining malware connections with machine and deep learning

Pastor et al., 2020

View PDF
Document ID
629762710374700819
Author
Pastor A
Mozo A
Vakaruk S
Canavese D
López D
Regano L
Gómez-Canaval S
Lioy A
Publication year
Publication venue
Ieee Access

External Links

Snippet

Nowadays, malware has become an epidemic problem. Among the attacks exploiting the computer resources of victims, one that has become usual is related to the massive amounts of computational resources needed for digital currency cryptomining. Cybercriminals steal …
Continue reading at ieeexplore.ieee.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01MTESTING STATIC OR DYNAMIC BALANCE OF MACHINES OR STRUCTURES; TESTING STRUCTURES OR APPARATUS NOT OTHERWISE PROVIDED FOR
    • G01M15/00Testing of engines
    • G01M15/04Testing of internal-combustion engines, e.g. diagnostic testing of piston engines
    • G01M15/12Testing of internal-combustion engines, e.g. diagnostic testing of piston engines by monitoring vibrations
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting

Similar Documents

Publication Publication Date Title
Pastor et al. Detection of encrypted cryptomining malware connections with machine and deep learning
Moustafa A new distributed architecture for evaluating AI-based security systems at the edge: Network TON_IoT datasets
Xing et al. Survey on botnet detection techniques: Classification, methods, and evaluation
Lima Filho et al. Smart detection: an online approach for DoS/DDoS attack detection using machine learning
Meng et al. Enhancing the security of blockchain-based software defined networking through trust-based traffic fusion and filtration
US11856013B2 (en) Method and system for detecting lateral movement in enterprise computer networks
Rizvi et al. Application of artificial intelligence to network forensics: Survey, challenges and future directions
Om Kumar et al. Detecting and confronting flash attacks from IoT botnets: CU Om Kumar, PRK Sathia Bhama
Kartaltepe et al. Social network-based botnet command-and-control: emerging threats and countermeasures
Prajisha et al. An efficient intrusion detection system for MQTT-IoT using enhanced chaotic salp swarm algorithm and LightGBM: C. Prajisha, AR Vasudevan
US20250286903A1 (en) Enhanced encrypted traffic analysis via integrated entropy estimation and neural network-based feature hybridization
Memos et al. A secure network model against bot attacks in edge-enabled industrial Internet of Things
Batool et al. [Retracted] Lightweight Statistical Approach towards TCP SYN Flood DDoS Attack Detection and Mitigation in SDN Environment
Zeleke et al. Efficient intrusion detection system for SDN orchestrated Internet of Things
Li et al. Towards blockchained challenge-based collaborative intrusion detection
Qin et al. Symmetry degree measurement and its applications to anomaly detection
Haddadi et al. Botnet behaviour analysis: How would a data analytics‐based system with minimum a priori information perform?
Gurung et al. Cids: Collaborative intrusion detection system using blockchain technology
Sefati et al. A comprehensive survey of cybersecurity techniques based on quality of service (QoS) on the Internet of Things (IoT)
Ahmed et al. A Systematic Literature Review on Cyber Attack Detection in Software-Define Networking (SDN)
Hayawi et al. A false positive resilient distributed trust management framework for collaborative intrusion detection systems
Li et al. Network Security
Conti et al. Distributed services attestation in IoT
Rai et al. Intrusion detection systems: A review
Al-Mousa et al. cl-CIDPS: A cloud computing based cooperative intrusion detection and prevention system framework