Flow-based detection and proxy-based evasion of encrypted malware C2 traffic.
Carlos NovoRicardo MorlaPublished in: CoRR (2020)
Keyphrases
- malware detection
- detection method
- detection algorithm
- detection accuracy
- false positives
- automatic detection
- detection rate
- object detection
- detect malicious
- network traffic
- malicious executables
- real time
- false alarms
- face detection
- countermeasures
- anomaly detection
- origin destination
- vehicle detection and tracking