Search results for "malware"

showing 10 items of 32 documents

Review of detection, assessment and mitigation of security risk in smart grid

2017

The integration of Information and Communication Technology (ICT) into the existing power grid has created new problems to the grid. The grid network has become more vulnerable to security threats and risk which is a corollary to the modern data network. Smart Grid has strict latency requirement for data communication and the violation of this latency is very costly. This paper assesses the threats and vulnerabilities associated with the Smart Grid network and reviews the methods to mitigate these security risks.

Grid networkComputer sciencebusiness.industryAccess controlComputer securitycomputer.software_genreGridSmart gridInformation and Communications TechnologyMalwareRisk assessmentbusinesscomputerRisk management2017 2nd International Conference on Power and Renewable Energy (ICPRE)
researchProduct

Verkkohuijausten tyypit sosiaalisessa mediassa

2017

Types of online scams in social media. In this thesis, types of online scams in social media are examined first by defining online scams and then applying the principles of them to social media setting. The thesis is a literature review in which it was found that in social media there are similar types of scams than outside of it. These types of scams were phishing scams, scams related to social engineering malware attacks and 419 -scams. There were a couple of scam scenarios that were not detected outside of social media context due to social networking site required as a platform for the scams. These were scams involving impersonation of celebrities or friends, services offering followers…

haittaohjelmatkirjallisuuskatsausidentiteettivarkausmalwaresocial mediasosiaalinen mediaonline scamphishingverkkourkintasocial networking site
researchProduct

First global next-to-leading order determination of diffractive parton distribution functions and their uncertainties within the {\tt xFitter} framew…

2018

We present {\tt GKG18-DPDFs}, a next-to-leading order (NLO) QCD analysis of diffractive parton distribution functions (diffractive PDFs) and their uncertainties. This is the first global set of diffractive PDFs determined within the {\tt xFitter} framework. This analysis is motivated by all available and most up-to-date data on inclusive diffractive deep inelastic scattering (diffractive DIS). Heavy quark contributions are considered within the framework of the Thorne-Roberts (TR) general mass variable flavor number scheme (GM-VFNS). We form a mutually consistent set of diffractive PDFs due to the inclusion of high-precision data from H1/ZEUS combined inclusive diffractive cross sections me…

QuarkParticle physicsPhysics and Astronomy (miscellaneous)parton distribution functionsHERAPREDICTIONSFOS: Physical scienceslcsh:AstrophysicsPartonhiukkasfysiikkaPROTON114 Physical sciences01 natural sciencesZeus (malware)CROSS-SECTIONSHigh Energy Physics - ExperimentDEEP-INELASTIC SCATTERINGHigh Energy Physics - Experiment (hep-ex)High Energy Physics - Phenomenology (hep-ph)deep inelastic scatteringlcsh:QB460-4660103 physical sciencesquantum chromodynamicslcsh:Nuclear and particle physics. Atomic energy. RadioactivityQCD ANALYSIS010306 general physicsEngineering (miscellaneous)PhysicsQuantum chromodynamicsLarge Hadron Collider010308 nuclear & particles physicsHERADeep inelastic scatteringHigh Energy Physics - PhenomenologyDistribution functionTESTSPHOTOPRODUCTIONlcsh:QC770-798LHC
researchProduct

Detection of algorithmically generated malicious domain names using masked N-grams

2019

Abstract Malware detection is a challenge that has increased in complexity in the last few years. A widely adopted strategy is to detect malware by means of analyzing network traffic, capturing the communications with their command and control (C&C) servers. However, some malware families have shifted to a stealthier communication strategy, since anti-malware companies maintain blacklists of known malicious locations. Instead of using static IP addresses or domain names, they algorithmically generate domain names that may host their C&C servers. Hence, blacklist approaches become ineffective since the number of domain names to block is large and varies from time to time. In this paper, we i…

0209 industrial biotechnologyDomain generation algorithmComputer scienceGeneral Engineering02 engineering and technologycomputer.software_genreBlacklistComputer Science ApplicationsRandom forestDomain (software engineering)020901 industrial engineering & automationArtificial IntelligenceServer0202 electrical engineering electronic engineering information engineeringMalware020201 artificial intelligence & image processingData miningcomputerHost (network)Block (data storage)Expert Systems with Applications
researchProduct

Técnicas de aprendizaje automático para la detección de dominios maliciosos generados algorítmicamente

2022

Durante los últimos años, el desarrollo de software malicioso (malware) ha pasado de ser un sector donde la principal motivación era el reconocimiento de la comu- nidad a convertirse en un auténtico negocio multimillonario. Entre las diferentes técnicas que los desarrolladores de malware han empleado para dificultar su de- tección, está el uso de algoritmos de generación de dominios (en inglés, Domain Generation Algorithms o DGA). En el trabajo plasmado en esta tesis doctoral se ha analizado la problemática de esta técnica, se han revisado los diferentes tipos de algoritmos que se pueden encontrar y se ha estudiado el estado del arte en la detección de este tipo de algoritmos en cuanto a té…

dga:CIENCIAS TECNOLÓGICAS [UNESCO]malwareaprendizaje automáticoUNESCO::CIENCIAS TECNOLÓGICAS
researchProduct

Security Implications of Using Third-Party Resources in the World Wide Web

2018

Modern web pages have nothing in common with the static connotation coming from the word “page” - it is a dynamic unique experience created by active content and executed within browser, just-in-time assembled from various resources hosted on many different domains. Active content increases attack surface naturally exposing users to many novel threats. A popular security advice has been to deploy active content blocker plugins like NoScript, unfortunately they are not capable to effectively stop the attacks. Content Security Policy (CSP) can be effective against these attacks, but we demonstrate how poor decisions made by website administrators or external resource hosters can render CSP in…

World Wide WebScripting languageComputer scienceCross-site scriptingWeb pageMalwareAttack surfaceContent Security Policycomputer.software_genreSecurity policycomputerVulnerability (computing)2018 IEEE 6th Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE)
researchProduct

Interneta drošības risinājumi

2015

Interneta drošības risinājumi. Oskars Veiss, darba vadītājs Latvijas Universitātes lektors Valdis Auza. Darba mērķis: Noskaidrot izkliedētā pakalpojuma attāluma(DDOS) un mēstuļu izplatību Latvijā un Pasaulē. Darba uzdevumi: 1.Apspoguļot izkliedētā pakalpojuma attāluma(DDOS) uzbrukumu būtību. 2.Apkopot informācija par tā attīstību (DDOS) 3.Izpētīt uzņēmuma aizsardzību pret šādiem uzbrukumiem 4.Sniegt rininājumus un priekšlikumus to novēršanai Pētījumā secināts, ka uzņēmuma nav izstrādāta efektīva aizsardzība pret šiem uzbrukumiem. Sniegti risinājumi un priekšlikumi tā aizsardzībai. Darbs satur 60lpp, 23 attēlus, 1 pielikums. Darba praktiskajā daļā veikta aptauja uzņēmumā „X”. Respondentu ska…

VadībzinātneMēstulesDrošībaDDOSMalware
researchProduct

Virtual USB honeypot

2019

This paper presents the implementation of a malware trap device. We created a virtual usb device through the use of microvisor on the ARM platform.

Trap (computing)ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSSoftware_OPERATINGSYSTEMSHoneypotComputer sciencelawOperating systemMalwareUSBcomputer.software_genrecomputerlaw.inventionProceedings of the 12th ACM International Conference on Systems and Storage
researchProduct

Image-based and range-based 3D modelling of archaeological cultural heritage: The telamon of the temple of Olympian Zeus in Agrigento (Italy)

2012

Abstract. The Temple of Olympian Zeus in Agrigento (Italy) was one of the largest temple and at the same time one of the most original of all the Greek architecture. We don’t know exactly how it was because the temple is now almost completely destroyed but it is very well-known for the presence of the Telamons. The Telamons were giant statues (about 8 meters high) probably located outside the temple to fill the interval between the columns. In accordance with the theory most accredited by archaeologists the Telamons were a decorative element and also a support for the structure. However, this hypothesis has never been scientifically proven. One Telamon has been reassembled and is shown at t…

lcsh:Applied optics. PhotonicsEngineeringbusiness.industrylcsh:Tlcsh:TA1501-1820Fotogrammetria Laser scanning Modelli 3D Beni archeologiciPhotogrammetry Laser scanning 3D Model Archaeological HeritageZeus (malware)Archaeologylcsh:TechnologyCultural heritagemedicine.anatomical_structurePhotogrammetrylcsh:TA1-2040TempleRange (statistics)medicineIBMArchitecturebusinesslcsh:Engineering (General). Civil engineering (General)Settore ICAR/06 - Topografia E CartografiaImage based
researchProduct

Support vector machine integrated with game-theoretic approach and genetic algorithm for the detection and classification of malware

2013

Abstract. —In the modern world, a rapid growth of mali- cious software production has become one of the most signifi- cant threats to the network security. Unfortunately, wides pread signature-based anti-malware strategies can not help to de tect malware unseen previously nor deal with code obfuscation te ch- niques employed by malware designers. In our study, the prob lem of malware detection and classification is solved by applyin g a data-mining-based approach that relies on supervised mach ine- learning. Executable files are presented in the form of byte a nd opcode sequences and n-gram models are employed to extract essential features from these sequences. Feature vectors o btained are…

ta113Network securitybusiness.industryComputer scienceFeature vectorFeature extractionuhatBytecomputer.file_formatMachine learningcomputer.software_genrehaittaohjelmatSupport vector machineObfuscation (software)ComputingMethodologies_PATTERNRECOGNITIONnetworknetwork securityMalwareData miningArtificial intelligenceExecutabletietoturvabusinesscomputer2013 IEEE Globecom Workshops (GC Wkshps)
researchProduct