2005
DOI: 10.1007/11552055_21
|View full text |Cite
|
Sign up to set email alerts
|

Polymorphic Code Detection with GA Optimized Markov Models

Abstract: Abstract. This paper presents our progression in the search for reliable anomaly-based intrusion detection mechanisms. We investigated different options of stochastic techniques. We started our investigations with Markov chains to detect abnormal traffic. The main aspect in our prior work was the optimization of transition matrices to obtain better detection accuracy. First, we tried to automatically train the transition matrix with normal traffic. Then, this transition matrix was used to calculate the probabi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2008
2008
2019
2019

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 4 publications
0
6
0
Order By: Relevance
“…Note that, Clet engine is endowed with a spectrum analysis mechanism which was designed in order to defeat Data Mining methods. However, evaluation results obtained in [36,37] show a detection rate of 100% for Clet engine with a low rate of false positives.…”
Section: Related Workmentioning
confidence: 80%
See 2 more Smart Citations
“…Note that, Clet engine is endowed with a spectrum analysis mechanism which was designed in order to defeat Data Mining methods. However, evaluation results obtained in [36,37] show a detection rate of 100% for Clet engine with a low rate of false positives.…”
Section: Related Workmentioning
confidence: 80%
“…In these works, Data Mining methods are used as a learning process which is performed over a set of samples (positives and negatives datasets). For instance, in [37] authors suggest the use of Neural Networks as training process, whereas in [36] authors propose to use the Markov Chains. Note that, Clet engine is endowed with a spectrum analysis mechanism which was designed in order to defeat Data Mining methods.…”
Section: Related Workmentioning
confidence: 98%
See 1 more Smart Citation
“…This approach is robust but exhausted because of disassemble. Udo Payer et al [9] give a similar approach to detect executable code in flows, but use Markov Mode to bytes rather than instructions, so it achieves a better performance, but it cannot distinguish shellcode from benign executable code.…”
Section: Related Workmentioning
confidence: 99%
“…According to [9], the probability of occurrence of a byte sequence is evidently different between data and executable codes. We use Marcov Mode [9, 10] to profile the difference.…”
Section: Executable Codes Detectionmentioning
confidence: 99%