2018
DOI: 10.1155/2018/9706706
|View full text |Cite
|
Sign up to set email alerts
|

Abnormal Behavior Detection to Identify Infected Systems Using the APChain Algorithm and Behavioral Profiling

Abstract: Recent cyber-attacks have used unknown malicious code or advanced attack techniques, such as zero-day attacks, making them extremely difficult to detect using traditional intrusion detection systems. Botnet attacks, for example, are a very sophisticated type of cyber-security threat. Malicious code or vulnerabilities are used to infect endpoints. Systems infected with this malicious code connect a communications channel to a command and control (C&C) server and receive commands to perform attacks on target… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…CNN’s have been applied to image-based anomaly detection tasks, such as identifying defects in manufacturing processes [ 16 ] and detecting abnormalities in medical images [ 17 ]. RNNs have been applied to time-series-based anomaly detection tasks, such as identifying abnormal behavior in network traffic data [ 18 ] and detecting anomalies in sensor data [ 19 ]. In summary, deep learning methods have shown promising performance in various anomaly detection tasks.…”
Section: Literature Review and Related Workmentioning
confidence: 99%
“…CNN’s have been applied to image-based anomaly detection tasks, such as identifying defects in manufacturing processes [ 16 ] and detecting abnormalities in medical images [ 17 ]. RNNs have been applied to time-series-based anomaly detection tasks, such as identifying abnormal behavior in network traffic data [ 18 ] and detecting anomalies in sensor data [ 19 ]. In summary, deep learning methods have shown promising performance in various anomaly detection tasks.…”
Section: Literature Review and Related Workmentioning
confidence: 99%
“…Within the framework of searching for effective solutions to the problems of the first group, studies are underway to create and improve antimalware consisting of subroutines (Zelinka et al 2018). The purpose of the latter is to detect and prevent the spread of viruses and other potentially malicious programs, and to remove them (Meridji et al, 2019) The developed and implemented software and hardware tools are oriented at achieving this goal, to a greater or lesser extent; these tools are based on a number of methods and technologies for detecting viruses that have certain disadvantages, primarily such as the method for matching the definition of a virus in a dictionary (Levy and Shalom, 2020), the method for generating and distributing signatures (i.e., the attack or virus signatures used to detect them) (Al-Asli and Ghaleb, 2019), the method for detecting suspicious (abnormal) program behavior (Seo and Lee, 2018), the emulation-based method for computer virus detection (Bist, 2013), the method for analyzing the sandbox environment (Madan et al, 2022), the white list technology, the heuristic analysis technologies (Rehman et al, 2018), and others.…”
Section: Literature Reviewmentioning
confidence: 99%