Essays about: "malware"
Showing result 21 - 25 of 89 essays containing the word malware.
-
21. Data loss prevention in a remote work environment
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : Data is one of the most valuable organizational assets that are susceptible to compromise when appropriate security measures are not in place. Preventing data loss is a dynamic and ongoing process that requires frequent effort and investment from organizations. This study provides a comprehensive overview of the risk to organizational data (i.e. READ MORE
-
22. Convolutional, adversarial and random forest-based DGA detection : Comparative study for DGA detection with different machine learning algorithms
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : Malware is becoming more intelligent as static methods for blocking communication with Command and Control (C&C) server are becoming obsolete. Domain Generation Algorithms (DGAs) are a common evasion technique that generates pseudo-random domain names to communicate with C&C servers in a difficult way to detect using handcrafted methods. READ MORE
-
23. Scanning and Host Fingerprinting Methods for Command and Control Server Detection
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. Detecting malware command and control infrastructure has impor-tant applications for protecting against attacks. Much research has focused on thisproblem, but a majority of this research has used traffic monitoring methods fordetection. Objectives. READ MORE
-
24. Comparing state-of-the-art machine learning malware detection methods on Windows
University essay fromAbstract : Background. Malware has been a major issue for years and old signature scanning methods for detecting malware are outdated and can be bypassed by most advanced malware. With the help of machine learning, patterns of malware behavior and structure can be learned to detect the more advanced threats that are active today. Objectives. READ MORE
-
25. Living off the Land Binaries with Virtual Machines
University essay from Högskolan i HalmstadAbstract : As the threat of ransomware increases, the ever-growing demand for more efficient cybersecurityimplementations invite cybercriminals to find new methods of bypassing these counter measures.One method for bypassing potential antivirus software is to use the binaries already present on thevictim device, causing them damage by using trusted binaries which does not trigger windowsdefender (or similar antivirus measures). READ MORE