Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
We present a novel network-level behavioral malware clustering system. We focus on analyzing the structural similarities among malicious HTTP traffic traces.
Abstract. We present a novel network-level behavioral malware clustering system. We focus on analyzing the structural similarities among malicious HTTP ...
We present a novel network-level behavioral malware clustering system. We focus on analyzing the structural similarities among malicious HTTP traffic traces ...
Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces. Roberto Perdisci, Georgia Institute of Technology and ...
Behavioral clustering of HTTP-based malware and signature generation using malicious network traces ; Year of Publication, 2010 ; Authors, Perdisci R, Lee W, ...
Prior work proposed a variety of methods for detecting malicious network activity over HTTP, including URL-based detection [40], [42], detection using web-proxy ...
... Behavioral clustering of http-based malware and signature generation using malicious network traces. In: NSDI (2010). Google Scholar. Perdisci, R., Vamo, M.U. ...
Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces https://www.usenix.org/legacy/event/nsdi10/tech ...
Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces · Sandnet: network traffic analysis of malicious software.
In S&P, 2005. 26. R. Perdisci, W. Lee, and N. Feamster. Behavioral clustering of http-based malware and signature generation using malicious network traces.