The Pulse of Fileless Cryptojacking Attacks: Malicious PowerShell Scripts.
Said VarliogluNelly ElsayedEva Ruhsar VarliogluMurat OzerZag ElSayedPublished in: CoRR (2024)
Keyphrases
- malicious users
- detect malicious
- malicious attacks
- detecting malicious
- insider attacks
- malicious behavior
- malicious code
- malicious activities
- insider threat
- semi fragile watermarking
- malicious nodes
- normal traffic
- countermeasures
- ultra wideband
- pulse width
- scripting language
- reverse engineering
- network traffic
- intrusion detection system
- identity theft
- traffic analysis
- security threats
- cryptographic protocols
- static analysis
- wireless sensor networks