• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 132
  • 26
  • 12
  • 11
  • 9
  • 6
  • 4
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 263
  • 117
  • 89
  • 81
  • 68
  • 44
  • 41
  • 40
  • 38
  • 37
  • 36
  • 35
  • 32
  • 29
  • 27
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Classification and identification of malicious code based on heuristic techniques utilizing meta languages

Schmall, Markus. January 2003 (has links) (PDF)
Hamburg, University, Diss., 2002.
2

Malware Classification Based on File and Registry Activities

Zeng, Ling-Ming 12 September 2012 (has links)
Cyber criminals are trying to steal personal information from victim¡¦s machine to acquire more benefits by using malware. Antivirus is the most commonly used tool of malware identification, but the frequency of virus definition update is often less than the frequency of new type malware increase. Therefore, we need an effective and fast tool of malware identification in the current environment. In addition to antivirus, software analysis platform is currently one of the ways to identify malware. User could figure out behaviors of software in detail by the analysis report provided by software analysis platform. Most of software analysis platforms only offer an analysis report, user have to identify whether the software is malware or not by them self. This type of report is no help for user if their expertise not enough to find out these behaviors. Some of software analysis platforms which used antivirus can provide information to user about the software is malware or not, but they don¡¦t have the ability of identifying new type malware immediately. According to research and analysis report, we generalized differences in file and registry activities of normal software and malware and defined malware classification features from these differences. We adopted Support Vector Machine¡]SVM¡^as our algorithm of classification to build and test three classifiers which can identify normal software and malware. After several experimental evaluations, we confirmed that the identification rate of malware was up to 97.6%. Finally, we compared the performance of our classifiers with ThreatExpert, and the result show that the performance of our classifiers is as well as ThreatExpert.
3

Malwares brasileiros: técnicas, alvos e tendências

ARCOVERDE, Henrique Ferraz 08 August 2013 (has links)
Submitted by João Arthur Martins (joao.arthur@ufpe.br) on 2015-03-10T18:59:10Z No. of bitstreams: 2 Dissertacao Henrique Arcoverde.pdf: 3082942 bytes, checksum: ef1660c240d4704b1b59d9fcdb6ae063 (MD5) license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5) / Approved for entry into archive by Daniella Sodre (daniella.sodre@ufpe.br) on 2015-03-10T19:42:10Z (GMT) No. of bitstreams: 2 Dissertacao Henrique Arcoverde.pdf: 3082942 bytes, checksum: ef1660c240d4704b1b59d9fcdb6ae063 (MD5) license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5) / Made available in DSpace on 2015-03-10T19:42:11Z (GMT). No. of bitstreams: 2 Dissertacao Henrique Arcoverde.pdf: 3082942 bytes, checksum: ef1660c240d4704b1b59d9fcdb6ae063 (MD5) license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5) Previous issue date: 2013-08-08 / Diante de uma sociedade que cada vez mais se alicerça em atividades digitais, é notória a disponibilização de serviços, outrora presentes quase que exclusivamente através de uma interface física, em meio digital. Como exemplo de tais serviços, podemos verificar; internet banking, e-mail, sites de relacionamento, financeiras, corretoras, etc. Todavia, tal qual vemos o crescimento dos serviços online, podemos verificar a migração de atividades criminosas do meio físico para o meio digital. É perante os ingentes números que reportam o volume de fraudes relacionadas ao meio digital, que urge a necessidade de conhecer as ameaças responsáveis por tais infortúnios. Dentre tais números, temos um grande percentual relacionados aos softwares deliberadamente programados para agirem de forma maliciosa, são os malwares. Sob tais considerações, associado ao alto nível de atividade das ameaças brasileiras, o presente trabalho pretende expor, através da análise de artefatos maliciosos brasileiros, as principais técnicas utilizadas pelos malwares brasileiros, quais as suas tendências e alvos. As referidas informações são essenciais para a compreensão global da ameaça, bem como para desenvolver mecanismos que permitam minimizar as perdas relativas a artefatos maliciosos.
4

Malware Recognition by Properties of Executables

Redfern, Cory 20 December 2009 (has links)
This thesis explores what patterns, if any, exist to differentiate non-malware from malware, given only a sequence of raw bytes composing either a received file or a fixed-length initial segment of a received file. If any such patterns are found, their effectiveness as filtering criteria is investigated.
5

Undetectable Debugger / Undetectable Debugger

Demín, Michal January 2012 (has links)
Using debuggers is a common mean for identifying and analyzing malware (such as viruses, worms, spyware, rootkits, etc.). However, debuggers can be detected by malware via observing of the behavior of operating system, changes in code (such as breakpoint instructions) and non-standard behavior of the CPU, making the analysis of the malware can be hard and tedious. In this thesis we are implementing a basic debugger based on the QEMU emulator that hides its presence from the debugged application. This is accomplished by using the QEMU as virtual machine and adding context awareness to the already existing primitive debugger. The context awareness is implemented using an embedded Python scripting engine. Such setup gives us a flexible way of implementing support for various operating systems. In this thesis, we have developed two examples. One example is for the RTEMS operating system, which serves as easy to understand reference implementation. Second example is for the Linux operating system, to show the abilities of the undetectable debugger in a more real scenario.
6

Malware och injicering i Windows för inbyggda system

Gillström, Niklas January 2011 (has links)
No description available.
7

Multi-agent malicious behaviour detection

Wegner, Ryan 24 October 2012 (has links)
This research presents a novel technique termed Multi-Agent Malicious Behaviour Detection. The goal of Multi-Agent Malicious Behaviour Detection is to provide infrastructure to allow for the detection and observation of malicious multi-agent systems in computer network environments. This research explores combinations of machine learning techniques and fuses them with a multi-agent approach to malicious behaviour detection that effectively blends human expertise from network defenders with modern artificial intelligence. Success of the approach depends on the Multi-Agent Malicious Behaviour Detection system's capability to adapt to evolving malicious multi-agent system communications, even as the malicious software agents in network environments vary in their degree of autonomy and intelligence. This thesis research involves the design of this framework, its implementation into a working tool, and its evaluation using network data generated by an enterprise class network appliance to simulate both a standard educational network and an educational network containing malware traffic.
8

Multi-agent malicious behaviour detection

Wegner, Ryan 24 October 2012 (has links)
This research presents a novel technique termed Multi-Agent Malicious Behaviour Detection. The goal of Multi-Agent Malicious Behaviour Detection is to provide infrastructure to allow for the detection and observation of malicious multi-agent systems in computer network environments. This research explores combinations of machine learning techniques and fuses them with a multi-agent approach to malicious behaviour detection that effectively blends human expertise from network defenders with modern artificial intelligence. Success of the approach depends on the Multi-Agent Malicious Behaviour Detection system's capability to adapt to evolving malicious multi-agent system communications, even as the malicious software agents in network environments vary in their degree of autonomy and intelligence. This thesis research involves the design of this framework, its implementation into a working tool, and its evaluation using network data generated by an enterprise class network appliance to simulate both a standard educational network and an educational network containing malware traffic.
9

Protecting communication infrastructures against attacks with programmable networking technology

Hess, Andreas. Unknown Date (has links) (PDF)
Berlin, Techn. University, Diss., 2008.
10

Bezpečnostní technologie: Honeypot / Security technology: Honeypot

Buriánek, Adam January 2016 (has links)
The result of the thesis is to characterize the safety technology honeypots, presentation of their capability to monitor security attacks, finding motivation of the attackers and their techniques. The theoretical part of solving the problems of the thesis is based on the study and analysis of mostly foreign expert information resources. The practical part is based on the specification and implementation of the most famous Honeypot on the Internet and the subsequent analysis of logs. The benefit of the thesis are the results that have been offered and the network security specialists for analysis and automatic recording of threats to records third-party servers.

Page generated in 0.059 seconds