SearchSkip to Search Results
- 2malware detection
- 1Distributed Denial of Service attacks
- 1DoS attacks
- 1behavioral analysis
Due to the changing behavior of ransomware, traditional classification and detection techniques do not accurately detect new variants of ransomware. Attackers use polymorphic and metamorphic techniques to avoid detection of signature -based systems. We use machine learning classification to...
Distributed Denial of Service attacks have long been a staple of the Internet?s malware community that has not been dealt with outside of companies with large budgets. Many of these attacks use spoofing to obfuscate their originating address. It is this problem that I intend to address with a new...
While some percentage of new-born malware has always evaded detection by anti-malware services, the quantity of malware able to compromise preventative controls is increasing. Therefore, enterprise security practitioners must confront the reality that malware will infect their organization's...
The Android operating system is increasingly exposed to a growing list of dangerous malware attacks, these attacks cost users and businesses. There is considerable research into Android malware detection, malware behavior, interaction and permissions. However, there is much less research effort...