Incorporating known malware signatures to classify new malware variants in network traffic.
Ismahani Binti IsmailMuhammad Nadzir MarsonoBan Mohammed KhammasSulaiman Mohd NorPublished in: Int. J. Netw. Manag. (2015)
Keyphrases
- network traffic
- malicious code
- anomaly detection
- network security
- intrusion detection
- anti virus
- malware detection
- reverse engineering
- malicious traffic
- static analysis
- network management
- network bandwidth
- computer networks
- traffic volume
- intrusion detection system
- traffic data
- computer security
- traffic analysis
- network resources
- network monitoring
- internet traffic
- traffic patterns
- network intrusion detection
- network traffic data
- detecting anomalous
- long range dependence
- dynamic analysis
- reinforcement learning
- non stationary