Detecting disguised processes using Application-Behaviour Profiling
In order to avoid detection, malware can disguise itself as a legitimate program or hijack system processes to reach its goals. Commonly used signature-based Intrusion Detection Systems (IDS) struggle to distinguish between these processes and are thus only of limited use to detect such attacks. The...
Main Authors: | Vaas, C, Happa, J |
---|---|
Format: | Conference item |
Published: |
Institute of Electrical and Electronics Engineers
2017
|
Similar Items
-
Applications undercover: Detecting disguised processes through application behaviour profiling
by: Vaas, C
Published: (2015) -
Behaviourism in disguise: the triviality of Ramsey sentence functionalism
by: Lowther, T
Published: (2020) -
Perfect disguises
by: Kristina Goodnight, et al.
Published: (2021-08-01) -
Meritocracy’s Disguise
by: Yisu Zhou (周忆粟)
Published: (2023-02-01) -
Free fermions in disguise
by: Fendley, P
Published: (2019)