Automated generation of models for fast and precise detection of HTTP-based malware

@article{Zarras2014AutomatedGO,
  title={Automated generation of models for fast and precise detection of HTTP-based malware},
  author={Apostolis Zarras and Antonis Papadogiannakis and Robert Gawlik and Thorsten Holz},
  journal={2014 Twelfth Annual International Conference on Privacy, Security and Trust},
  year={2014},
  pages={249-256}
}
Malicious software and especially botnets are among the most important security threats in the Internet. Thus, the accurate and timely detection of such threats is of great importance. Detecting machines infected with malware by identifying their malicious activities at the network level is an appealing approach, due to the ease of deployment. Nowadays, the most common communication channels used by attackers to control the infected machines are based on the HTTP protocol. To evade detection… CONTINUE READING
Highly Cited
This paper has 23 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 12 extracted citations

Semantics-aware detection of targeted attacks: a survey

Journal of Computer Virology and Hacking Techniques • 2016
View 4 Excerpts
Highly Influenced

A Method Based on Statistical Characteristics for Detection Malware Requests in Network Traffic

2018 IEEE Third International Conference on Data Science in Cyberspace (DSC) • 2018
View 2 Excerpts

Using anomaly detection based techniques to detect HTTP-based botnet C&C traffic

2016 IEEE International Conference on Communications (ICC) • 2016
View 2 Excerpts

Automatic NIDS Rule Generating System for Detecting HTTP-like Malware Communication

2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) • 2015
View 1 Excerpt

References

Publications referenced by this paper.
Showing 1-10 of 30 references

Understanding fraudulent activities in online ad exchanges

Internet Measurement Conference • 2011
View 1 Excerpt

Similar Papers

Loading similar papers…