Real-time malware detection framework in intrusion detection systems
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Sunwoo | - |
dc.contributor.author | Kim, Taeguen | - |
dc.contributor.author | Im, Eul Gyu | - |
dc.date.accessioned | 2022-07-16T07:55:04Z | - |
dc.date.available | 2022-07-16T07:55:04Z | - |
dc.date.created | 2021-05-13 | - |
dc.date.issued | 2013-10 | - |
dc.identifier.issn | 0000-0000 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/161778 | - |
dc.description.abstract | We suggest an efficient framework to detect malware in Intrusion Detection System (IDS). The framework generates signatures from malware families and generates corresponding detection rules. The generated signatures are not influenced by small changes of malware while they can be used to detect malware that has similar behaviors with normal programs. Our signatures are stored as an Aho-Corasick Tree form to improve signature matching performance in IDS. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | Association for Computing Machinary, Inc. | - |
dc.title | Real-time malware detection framework in intrusion detection systems | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Im, Eul Gyu | - |
dc.identifier.doi | 10.1145/2513228.2513297 | - |
dc.identifier.scopusid | 2-s2.0-84891375262 | - |
dc.identifier.bibliographicCitation | Proceedings of the 2013 Research in Adaptive and Convergent Systems, RACS 2013, pp.351 - 352 | - |
dc.relation.isPartOf | Proceedings of the 2013 Research in Adaptive and Convergent Systems, RACS 2013 | - |
dc.citation.title | Proceedings of the 2013 Research in Adaptive and Convergent Systems, RACS 2013 | - |
dc.citation.startPage | 351 | - |
dc.citation.endPage | 352 | - |
dc.type.rims | ART | - |
dc.type.docType | Conference Paper | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scopus | - |
dc.subject.keywordPlus | Aho-Corasick | - |
dc.subject.keywordPlus | Detection rules | - |
dc.subject.keywordPlus | Intrusion Detection Systems | - |
dc.subject.keywordPlus | Malware analysis | - |
dc.subject.keywordPlus | Malware detection | - |
dc.subject.keywordPlus | Malware families | - |
dc.subject.keywordPlus | Signature-matching | - |
dc.subject.keywordPlus | Tree form | - |
dc.subject.keywordPlus | Intrusion detection | - |
dc.subject.keywordPlus | Network security | - |
dc.subject.keywordPlus | Computer crime | - |
dc.subject.keywordAuthor | intrusion detection system | - |
dc.subject.keywordAuthor | malware analysis | - |
dc.subject.keywordAuthor | malware detection | - |
dc.subject.keywordAuthor | network security | - |
dc.identifier.url | https://dl.acm.org/doi/10.1145/2513228.2513297 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
222, Wangsimni-ro, Seongdong-gu, Seoul, 04763, Korea+82-2-2220-1365
COPYRIGHT © 2021 HANYANG UNIVERSITY.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.