DocumentCode :
2310329
Title :
Execution Patterns in Automatic Malware and Human-Centric Attacks
Author :
Gadelrab, Mohammed ; Kalam, Anas Abou El ; Deswarte, Yves
Author_Institution :
LAAS-CNRS, Toulouse
fYear :
2008
fDate :
10-12 July 2008
Firstpage :
29
Lastpage :
36
Abstract :
With the massive surges of new malware, the intuitive detection techniques currently used in most security tools deem ineffective. Consequently, we urgently need better solutions that are established on solid theoretical basis. It becomes, thus, necessary to search for more efficient techniques and algorithms as well as taxonomies and models for attacks and malware. We present, in this paper, the analysis we made on both automatic malware and human-centric attacks, which allowed us to construct a model for attack process. The main objective of this work is to construct a model that can aide in the generation of real attack scenarios and use it in the evaluation of Intrusion Detection Systems. However, the model described here could have many other potential uses. For example, it can be used for writing "execution- based" signatures, event correlation, penetration testing, security simulations as well as security educations.
Keywords :
invasive software; automatic malware; human-centric attack; intrusion detection system; Computer applications; Computer networks; Computer worms; Pattern analysis; Security; Software testing; Solids; Surges; Taxonomy; Writing; Attack; IDS; evaluation; malware; model; security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Network Computing and Applications, 2008. NCA '08. Seventh IEEE International Symposium on
Conference_Location :
Cambridge, MA
Print_ISBN :
978-0-7695-3192-2
Electronic_ISBN :
978-0-7695-3192-2
Type :
conf
DOI :
10.1109/NCA.2008.37
Filename :
4579636
Link To Document :
بازگشت