Run-time classification of malicious processes using system call analysis

Author(s):  
Raymond Canzanese ◽  
Spiros Mancoridis ◽  
Moshe Kam
Keyword(s):  
2021 ◽  
Author(s):  
Ori Or-Meir ◽  
Aviad Cohen ◽  
Yuval Elovici ◽  
Lior Rokach ◽  
Nir Nissim
Keyword(s):  

2020 ◽  
Vol 8 (6) ◽  
pp. 4978-4983

Diabetes mellitus is one of the major non-transmittable sicknesses which have unimaginable impact on human life today. Enormous Data Analytics improves social protection structure through the reduction run time and the perfect cost. Automated investigation impacts the exact appraisal of diabetics in a successful way. A diabetic influences individuals in different pieces of the body. A PC technique on the shade diabetics ought to be inspected to analyze the various impacts definitely. This is the pre-screening framework for early determination by diabetologist. The proposed work provides the report on the order of injuries from diabetic's dataset with fundamental advances, for example, pre-preparing and characterization. Here Multilayer Perceptron investigation is utilized to separate the highlights. The re-enactment quantifies the precise finding and affirms the exactness esteems up to 95% for Classification.


Author(s):  
Hossain Shahriar ◽  
Mohammad Zulkernine

Buffer overflow (BOF) is a well-known, and one of the worst and oldest, vulnerabilities in programs. BOF attacks overwrite data buffers and introduce wide ranges of attacks like execution of arbitrary injected code. Many approaches are applied to mitigate buffer overflow vulnerabilities; however, mitigating BOF vulnerabilities is a perennial task as these vulnerabilities elude the mitigation efforts and appear in the operational programs at run-time. Monitoring is a popular approach for detecting BOF attacks during program execution, and it can prevent or send warnings to take actions for avoiding the consequences of the exploitations. Currently, there is no detailed classification of the proposed monitoring approaches to understand their common characteristics, objectives, and limitations. In this paper, the authors classify runtime BOF attack monitoring and prevention approaches based on seven major characteristics. Finally, these approaches are compared for attack detection coverage based on a set of BOF attack types. The classification will enable researchers and practitioners to select an appropriate BOF monitoring approach or provide guidelines to build a new one.


2017 ◽  
Vol 23 (5) ◽  
pp. 4565-4569
Author(s):  
Nurzi Juana Mohd Zaizi ◽  
Madihah Mohd Saudi

2010 ◽  
Vol 1 (3) ◽  
pp. 18-40 ◽  
Author(s):  
Hossain Shahriar ◽  
Mohammad Zulkernine

Buffer overflow (BOF) is a well-known, and one of the worst and oldest, vulnerabilities in programs. BOF attacks overwrite data buffers and introduce wide ranges of attacks like execution of arbitrary injected code. Many approaches are applied to mitigate buffer overflow vulnerabilities; however, mitigating BOF vulnerabilities is a perennial task as these vulnerabilities elude the mitigation efforts and appear in the operational programs at run-time. Monitoring is a popular approach for detecting BOF attacks during program execution, and it can prevent or send warnings to take actions for avoiding the consequences of the exploitations. Currently, there is no detailed classification of the proposed monitoring approaches to understand their common characteristics, objectives, and limitations. In this paper, the authors classify runtime BOF attack monitoring and prevention approaches based on seven major characteristics. Finally, these approaches are compared for attack detection coverage based on a set of BOF attack types. The classification will enable researchers and practitioners to select an appropriate BOF monitoring approach or provide guidelines to build a new one.


Sign in / Sign up

Export Citation Format

Share Document