Essays about: "malware"

Showing result 21 - 25 of 89 essays containing the word malware.

  1. 21. Data loss prevention in a remote work environment

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Stanley Ugochukwu Emenike; [2021]
    Keywords : ;

    Abstract : Data is one of the most valuable organizational assets that are susceptible to compromise when appropriate security measures are not in place. Preventing data loss is a dynamic and ongoing process that requires frequent effort and investment from organizations. This study provides a comprehensive overview of the risk to organizational data (i.e. READ MORE

  2. 22. Convolutional, adversarial and random forest-based DGA detection : Comparative study for DGA detection with different machine learning algorithms

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Carl-Simon Brandt; Jonathan Kleivard; Andreas Turesson; [2021]
    Keywords : Domain generation algorithm; machine learning; neural networks; GAN; random forest; CNN;

    Abstract : Malware is becoming more intelligent as static methods for blocking communication with Command and Control (C&C) server are becoming obsolete. Domain Generation Algorithms (DGAs) are a common evasion technique that generates pseudo-random domain names to communicate with C&C servers in a difficult way to detect using handcrafted methods. READ MORE

  3. 23. Scanning and Host Fingerprinting Methods for Command and Control Server Detection

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Yuki Nakamura; Björn Åström; [2021]
    Keywords : command and control; C2; CnC; botnet; scanning; probing;

    Abstract : Background. Detecting malware command and control infrastructure has impor-tant applications for protecting against attacks. Much research has focused on thisproblem, but a majority of this research has used traffic monitoring methods fordetection. Objectives. READ MORE

  4. 24. Comparing state-of-the-art machine learning malware detection methods on Windows

    University essay from

    Author : Filip Ahlgren; [2021]
    Keywords : Malware; Machine Learning; Static Analysis;

    Abstract : Background. Malware has been a major issue for years and old signature scanning methods for detecting malware are outdated and can be bypassed by most advanced malware. With the help of machine learning, patterns of malware behavior and structure can be learned to detect the more advanced threats that are active today. Objectives. READ MORE

  5. 25. Living off the Land Binaries with Virtual Machines

    University essay from Högskolan i Halmstad

    Author : Jakob Lingaas Türk; [2021]
    Keywords : LOLbin; Living off the land; virtual machine escape; fileless malware;

    Abstract : As the threat of ransomware increases, the ever-growing demand for more efficient cybersecurityimplementations invite cybercriminals to find new methods of bypassing these counter measures.One method for bypassing potential antivirus software is to use the binaries already present on thevictim device, causing them damage by using trusted binaries which does not trigger windowsdefender (or similar antivirus measures). READ MORE