DSCI - Best Practices Meet 2013 2013
DOI: 10.1109/bpm.2013.6615011
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic malware detection and recording using virtual machine introspection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…For that, the analysis based on the type of attack is necessary i.e, for each type of attack we have to follow a particular set of steps to mitigate the probability of execution in the client machine. [23][24] [25][26] a. SYN ood attack SYN ood attacks can be prevented only by certain rewall ltering policies. Most of the SYN attacks ltering is an easy process since they will have the TCP header parameters which is common.…”
Section: Mitigation Of Ddos Attackmentioning
confidence: 99%
“…For that, the analysis based on the type of attack is necessary i.e, for each type of attack we have to follow a particular set of steps to mitigate the probability of execution in the client machine. [23][24] [25][26] a. SYN ood attack SYN ood attacks can be prevented only by certain rewall ltering policies. Most of the SYN attacks ltering is an easy process since they will have the TCP header parameters which is common.…”
Section: Mitigation Of Ddos Attackmentioning
confidence: 99%
“…The benefits of this virtualization technology are being applied in a variety of areas, and a lot of research is studying the security platform with virtualization. Representative examples include the dynamic analysis of malicious code using virtual machine, event logging analysis through virtualization, and analysis through a system playback function of virtualization [16][17][18][19].…”
Section: Virtualizationmentioning
confidence: 99%