2010
DOI: 10.1007/978-3-642-15497-3_42
|View full text |Cite
|
Sign up to set email alerts
|

Expressive, Efficient and Obfuscation Resilient Behavior Based IDS

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 17 publications
0
6
0
Order By: Relevance
“…The functionalities of interest were defined in the abstract system domain through activity diagrams, and the specified functionality was recognized by Colored Petri Net. They also built behavior‐based intrusion detection systems based on this approach to offer an effective solution against modern malware . Liu et al used a combination of techniques from the behavior monitors and Colored Petri Net for detecting virus and worms.…”
Section: Related Workmentioning
confidence: 99%
“…The functionalities of interest were defined in the abstract system domain through activity diagrams, and the specified functionality was recognized by Colored Petri Net. They also built behavior‐based intrusion detection systems based on this approach to offer an effective solution against modern malware . Liu et al used a combination of techniques from the behavior monitors and Colored Petri Net for detecting virus and worms.…”
Section: Related Workmentioning
confidence: 99%
“…However, a GSR is only defined for file viruses and it does not allow for tracing alternative realizations. Moreover, due to the token dynamics, the CP-net [14] recognition mechanism is more efficient than the one proposed in [3], i.e. state machines.…”
Section: Binary Self-replicationmentioning
confidence: 99%
“…Currently, behavioral metamorphism has not received much attention, and as such has not been studied or defined in the literature, however, an approach for behavioral obfuscation is given in [14]. This approach implies the use of several techniques to alter the realization of the given functionality so that it would have a different footprint in the system call domain.…”
Section: Behavioral Metamorphismmentioning
confidence: 99%
See 2 more Smart Citations