Fractal methods for the representation and analysis of polymorphism in malware


The preponderance of network resident cyber threats are due to zero day vulnerabilities or unpatched systems. Traditional signature based detection methods are ineffective against such threats, and anomaly detection methods are typically computationally intensive. By treating polymorphism as a stochastic process and applying fractal visualization methods… (More)
DOI: 10.1109/MilCIS.2013.6694490


12 Figures and Tables

Slides referencing similar topics