An Intrusion Using Malware and DDNS.
Gopinath PalaniappanBalaji RajendranS. SangeethaKumari Roshni V. SPublished in: CoRR (2019)
Keyphrases
- intrusion detection
- attack scenarios
- intrusion detection system
- malware detection
- reverse engineering
- alert correlation
- network security
- malicious code
- anomaly detection
- detect malicious
- attack detection
- control flow
- static analysis
- network traffic
- real time
- computer networks
- probabilistic model
- computer vision
- machine learning