In this paper, we present a scalable approach called Network Interrogator. (NetGator) to detect network-based malware that attempts to exfiltrate data over open ...
In this paper, we present a scalable approach called Network Interrogator (NetGator) to detect network-based malware that attempts to exfiltrate data over open ...
When the application is unable to correctly solve and respond to the challenge, NetGator flags the flow as potential malware. Our approach is seamless and ...
Netgator: Malware Detection Using Program. Interactive Challenges. Brian ... ▫ Program Interactive Challenges. ▫ Fully transparent to the user.
The major challenge in developing robust malware detec- tion solutions is to develop fast, scalable, real-time systems that can detect misuse, protocol ...
NetGator: Malware Detection Using Program Interactive Challenges · List of references · Publications that cite this publication.
NetGator: Malware Detection Using Program Interactive Challenges. B. Schulte, H. Andrianakis, K. Sun, and A. Stavrou. DIMVA, volume 7591 of Lecture Notes in ...
People also ask
How to do malware detection?
Is information hiding a challenge for malware detection?
What are the three types of malware analysis?
What does a malware detection program look for when running a scan?
NetGator: Malware Detection Using Program Interactive Challenges. Brian Schulte, Haris Andrianakis, Kun Sun, Angelos Stavrou. Pages 164-183. Download chapter ...
AIS is used to detect malwares and gets some exciting results. The most known AIS model is negative selection algorithm (NSA) and it can only use normal samples ...
A negative selection algorithm with online adaptive learning under small samples for anomaly detection · Computer Science. Neurocomputing · 2015.