Detecting disguised processes using Application-Behaviour Profiling

In order to avoid detection, malware can disguise itself as a legitimate program or hijack system processes to reach its goals. Commonly used signature-based Intrusion Detection Systems (IDS) struggle to distinguish between these processes and are thus only of limited use to detect such attacks. The...

Full description

Bibliographic Details
Main Authors: Vaas, C, Happa, J
Format: Conference item
Published: Institute of Electrical and Electronics Engineers 2017