A signature based architecture for Trojan detection.
Aderinola Gbade-AlabiDavid C. KeezerVincent John MooneyAxel York PoschmannMarc StöttingerKshitij DivekarPublished in: WESS (2014)
Keyphrases
- automatic detection
- detection algorithm
- anomaly detection
- false positives
- detection method
- detection accuracy
- object detection
- malicious executables
- intrusion detection
- management system
- case study
- database
- detection rate
- hardware architecture
- layered architecture
- architectural design
- design considerations
- network intrusion detection
- software architecture
- network architecture
- network traffic
- event detection
- data mining techniques
- expert systems
- computer vision