Alexander Volynkin

Learn More
The vulnerability of a modem computer network to information attacks stems from its high complexity, global interconnectivity and multiple entry points. While experimental security-related studies cannot be performed on "real" operating computer networks, and data collected during real information attacks is incomplete and sporadic, extensive network(More)
This paper presents an overview and evaluation of a novel approach for proactive protection against both known and previously unknown self-replicating malicious software. Instead of deciphering and screening suspect code for signatures of known viruses the approach monitors the runtime behavior of binary compiled executable code by monitoring its system(More)
Most information attacks on the Internet are perpetrated by deploying malicious codes. The spread of viruses and worms throughout the Internet is accomplished by self-replication, resulting in computer epidemics. Since most legitimate computer programs do not self-replicate and the number of ways to achieve self-replication is quite limited, the detection(More)
  • 1