2014
DOI: 10.1007/978-3-662-45237-0_60
|View full text |Cite
|
Sign up to set email alerts
|

Malware Behavior Modeling with Colored Petri Nets

Abstract: Part 9: Various Aspects of Computer SecurityInternational audienceWe propose a solution which provides a system operator with a mechanism that enables tracking and tracing of malware behavior which – in consequence – leads to its detection and neutralization. The detection is performed in two steps. Firstly single malicious activities are identified and filtered out. As they come from the identification module, they are compared with malware models constructed in the form of Colored Petri nets. In this article… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
6
2
1

Relationship

5
4

Authors

Journals

citations
Cited by 14 publications
(9 citation statements)
references
References 28 publications
0
9
0
Order By: Relevance
“…This implementation allows on-line detection and classification an anomalies based on NetFlow reports coming from probes deployed in network. SECOR is not limited to network anomaly detection, e.g., PRONTO module [101,102] developed by another team of the project detects obfuscated malware at infected hosts.…”
Section: Methodsmentioning
confidence: 99%
“…This implementation allows on-line detection and classification an anomalies based on NetFlow reports coming from probes deployed in network. SECOR is not limited to network anomaly detection, e.g., PRONTO module [101,102] developed by another team of the project detects obfuscated malware at infected hosts.…”
Section: Methodsmentioning
confidence: 99%
“…CPN Tools [15] is a modeling environment for editing, simulating, and analyzing colored Petri nets [14], [12]. Due to syntax differences CPN Tools cannot be use to simulate or verify RTCP-nets.…”
Section: Design Of Rtcp-nets With Cpn Toolsmentioning
confidence: 99%
“…The malware detection takes as an input a set of suspicious events received from the process' hooking engine, so-called PRONTOlogy, developed by the authors of this article [28,29]. This engine is based on ontology reasoning [30] used for the purpose of filtering single malicious incidents among hundred of thousands of regular ones.…”
Section: Cp-net Malware Modelsmentioning
confidence: 99%