A study on scalable information matching system based on web service informationSpringer Science and Business Media LLC - Tập 10 - Trang 81-88 - 2014
Sung-Ho Sim, Su-Jin Baek
As for search methods of web service, services are selected and utilized using a variety of search techniques. However, differentiation methods as to services become even more necessary since service quality is increasingly having a direct impact on the use of web service with the generation of various web services and an increase in the use of services. Currently, they state only with the descrip...... hiện toàn bộ
Recognition of tor malware and onion servicesSpringer Science and Business Media LLC - - Trang 1-15 - 2023
Jesper Bergman, Oliver B. Popov
The transformation of the contemporary societies through digital technologies has had a profound effect on all human activities including those that are in the realm of illegal, unlawful, and criminal deeds. Moreover, the affordances provided by the anonymity creating techniques such as the Tor protocol which are beneficial for preserving civil liberties, appear to be highly profitable for various...... hiện toàn bộ
Creating valid adversarial examples of malwareSpringer Science and Business Media LLC - - 2024
Matouš Kozák, Martin Jureček, Mark Stamp, Fabio Di Troia
Because of its world-class results, machine learning (ML) is becoming increasingly popular as a go-to solution for many tasks. As a result, antivirus developers are incorporating ML models into their toolchains. While these models improve malware detection capabilities, they also carry the disadvantage of being susceptible to adversarial attacks. Although this vulnerability has been demonstrated f...... hiện toàn bộ
Secure information authentication protocol between patients and medical staff in a hospital environmentSpringer Science and Business Media LLC - Tập 13 - Trang 271-278 - 2017
Yoon-Su Jeong
Recently, it has become possible for the hospital environment to provide medical services to patients anywhere by integrating IT technology in medical devices. However, medical services in the current environment face a problem in that identifiable patient information cannot be safely transferred to the medical staff when the patient is receiving medical services. In this paper, we propose a manda...... hiện toàn bộ
Post-quantum security of messengers: secure group chats and continuous key distribution protocolsSpringer Science and Business Media LLC - Tập 19 - Trang 373-380 - 2022
Julia Bobrysheva, Sergey Zapechnikov
Secure group chats in messengers are usually created in two ways: using pairwise channels with continuous key agreement according to the Double Ratchet scheme or using special cryptographic protocols, for example, based on a tree-like scheme for group keys generating. In the first case, each pair of users generates a common key, and the group is formed by the system tools. In the second case, all ...... hiện toàn bộ
A mathematical exploitation of simulated uniform scanning botnet propagation dynamics for early stage detection and managementSpringer Science and Business Media LLC - Tập 10 - Trang 29-51 - 2013
Julian L. Rrushi, Ali A. Ghorbani
The contribution of this paper is two-fold. Firstly, we propose a botnet detection approach that is sufficiently timely to enable a containment of the botnet outbreak in a supervised network. Secondly, we show that mathematical models of botnet propagation dynamics are a viable means of achieving that level of defense from bot infections in a supervised network. Our approach is built on the idea o...... hiện toàn bộ
Efficient botnet herding within the Tor networkSpringer Science and Business Media LLC - Tập 11 - Trang 19-26 - 2014
Lachlan Kang
During 2013 the Tor network had a massive spike in new users as a botnet started using Tor hidden services to hide its C&C (Command and Control) servers. This resulted in network congestion and reduced performance for all users. Tor hidden services are attractive to botnet herders because they provide anonymity for both the C&C servers and the bots. The aim of this paper is to present a superior w...... hiện toàn bộ
Markhor: malware detection using fuzzy similarity of system call dependency sequencesSpringer Science and Business Media LLC - Tập 18 - Trang 81-90 - 2021
Amir Mohammadzade Lajevardi, Saeed Parsa, Mohammad Javad Amiri
Static malware detection approaches are time-consuming and cannot deal with code obfuscation techniques. Dynamic malware detection approaches, on the other hand, address these two challenges, however, suffer from behavioral ambiguity, such as the system calls obfuscation. In this paper, we introduce Markhor, a dynamic and behavior-based malware detection approach. Markhor uses system call data dep...... hiện toàn bộ