Identifying malicious activities from system execution traces.

E. Aharoni, R. Peleg, S. Regev,T. Salman

IBM Journal of Research and Development(2016)

引用 5|浏览40
暂无评分
摘要
Every day, massive amounts of system events from software agents deployed at endpoint devices across the world are received by the IBM Trusteer security group. The software associated with each event is verified with respect to third-party malware inspection services such as VirusTotal. Unfortunately, many events are associated with software that is unrecognized by inspection services. As a result...
更多
查看译文
关键词
Malware,Feature extraction,Computer security,Inspection,Databases,Predictive models
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要