Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Real-time malware detection framework in intrusion detection systems

Full metadata record
DC Field Value Language
dc.contributor.authorKim, Sunwoo-
dc.contributor.authorKim, Taeguen-
dc.contributor.authorIm, Eul Gyu-
dc.date.accessioned2022-07-16T07:55:04Z-
dc.date.available2022-07-16T07:55:04Z-
dc.date.created2021-05-13-
dc.date.issued2013-10-
dc.identifier.issn0000-0000-
dc.identifier.urihttps://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/161778-
dc.description.abstractWe suggest an efficient framework to detect malware in Intrusion Detection System (IDS). The framework generates signatures from malware families and generates corresponding detection rules. The generated signatures are not influenced by small changes of malware while they can be used to detect malware that has similar behaviors with normal programs. Our signatures are stored as an Aho-Corasick Tree form to improve signature matching performance in IDS.-
dc.language영어-
dc.language.isoen-
dc.publisherAssociation for Computing Machinary, Inc.-
dc.titleReal-time malware detection framework in intrusion detection systems-
dc.typeArticle-
dc.contributor.affiliatedAuthorIm, Eul Gyu-
dc.identifier.doi10.1145/2513228.2513297-
dc.identifier.scopusid2-s2.0-84891375262-
dc.identifier.bibliographicCitationProceedings of the 2013 Research in Adaptive and Convergent Systems, RACS 2013, pp.351 - 352-
dc.relation.isPartOfProceedings of the 2013 Research in Adaptive and Convergent Systems, RACS 2013-
dc.citation.titleProceedings of the 2013 Research in Adaptive and Convergent Systems, RACS 2013-
dc.citation.startPage351-
dc.citation.endPage352-
dc.type.rimsART-
dc.type.docTypeConference Paper-
dc.description.journalClass1-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscopus-
dc.subject.keywordPlusAho-Corasick-
dc.subject.keywordPlusDetection rules-
dc.subject.keywordPlusIntrusion Detection Systems-
dc.subject.keywordPlusMalware analysis-
dc.subject.keywordPlusMalware detection-
dc.subject.keywordPlusMalware families-
dc.subject.keywordPlusSignature-matching-
dc.subject.keywordPlusTree form-
dc.subject.keywordPlusIntrusion detection-
dc.subject.keywordPlusNetwork security-
dc.subject.keywordPlusComputer crime-
dc.subject.keywordAuthorintrusion detection system-
dc.subject.keywordAuthormalware analysis-
dc.subject.keywordAuthormalware detection-
dc.subject.keywordAuthornetwork security-
dc.identifier.urlhttps://dl.acm.org/doi/10.1145/2513228.2513297-
Files in This Item
Go to Link
Appears in
Collections
서울 공과대학 > 서울 컴퓨터소프트웨어학부 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Im, Eul Gyu photo

Im, Eul Gyu
COLLEGE OF ENGINEERING (SCHOOL OF COMPUTER SCIENCE)
Read more

Altmetrics

Total Views & Downloads

BROWSE