Applications undercover: Detecting disguised processes through application behaviour profiling

<p>In order to avoid detection, malware can disguise itself as a legitimate program or hijack system processes to reach its goals. Commonly used signature-based Intrusion Detection Systems (IDS) struggle to distinguish between these processes and are thus only of limited use to detect these ki...

ver descrição completa

Detalhes bibliográficos
Autor principal: Vaas, C
Formato: Journal article
Idioma:English
Publicado em: 2015
Assuntos: