2016
DOI: 10.3745/jips.01.0009
|View full text |Cite
|
Sign up to set email alerts
|

HB-DIPM: Human Behavior Analysis-Based Malware Detection and Intrusion Prevention Model in the Future Internet

Abstract: As interest in the Internet increases, related technologies are also quickly progressing. As smart devices become more widely used, interest is growing in words are missing here like "improving the" or "figuring out how to use the" future Internet to resolve the fundamental issues of transmission quality and security. The future Internet is being studied to improve the limits of existing Internet structures and to reflect new requirements. In particular, research on words are missing here like "finding new for… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 24 publications
0
1
0
Order By: Relevance
“…However, modern malware employs a mosaic of overlapping procedures, both novel and antiquated, accompanied by a wide spectrum of obfuscation techniques to mask its true identity and persist within systems [13]. This latest generation of malicious software is capable of engineering more devastating attacks, including sustained and targeted ones, facilitated by a cocktail of malware types [14]. To discern and combat malicious software, we employ a range of malware identification tools, such as Google Rapid Response (GRR), Wireshark, VirusTotal, and more [15].…”
Section: Introductionmentioning
confidence: 99%
“…However, modern malware employs a mosaic of overlapping procedures, both novel and antiquated, accompanied by a wide spectrum of obfuscation techniques to mask its true identity and persist within systems [13]. This latest generation of malicious software is capable of engineering more devastating attacks, including sustained and targeted ones, facilitated by a cocktail of malware types [14]. To discern and combat malicious software, we employ a range of malware identification tools, such as Google Rapid Response (GRR), Wireshark, VirusTotal, and more [15].…”
Section: Introductionmentioning
confidence: 99%