PPT-Automated malware classification based on network behavior

Author : lindy-dunigan | Published Date : 2017-03-30

2013 international conference on computing networking and communications communications and information security symposium Author Saeed Nari Ali A Ghorbani

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "Automated malware classification based o..." is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

Automated malware classification based on network behavior: Transcript


2013 international conference on computing networking and communications communications and information security symposium Author Saeed Nari Ali A Ghorbani 17 1 Speaker Wen Lin Yu . A Look at Cuckoo Sandbox. Introduction. What is Malware?. (. mãl'wâr. ') - . Malicious . computer software that interferes with normal computer . functions. What is Automated Malware Analysis?. Taking what has been done by highly skilled professionals in extremely time consuming tasks and making it, quick, easy and repeatable. Automated Malware Analysis is being touted as the “Next Generation Anti-Virus” solution.. Android Malware Classification . Using Weighted . Contextual API Dependency . Graphs. Mu Zhang. Yue. . Duan. Heng. Yin. Zhiruo. Zhao. Department . of Electrical Engineering and . Computer Science. 2012 . IEEE/IPSJ 12. th. . International . Symposium on Applications and the . Internet. 102062596 . 陳盈妤. 1. /10. Outline. Introduction of proposed method. Previous works by catching random behavior. Malware Propagation in Mobile . Phone Networks. Chris Fleizach. 1. , Michael Liljenstam. 3. , . Per . Johansson. 2. , Geoffrey . M. . Voelker. 1. . and . András. Méhes. 3. 1. . 2. . 3. Introduction. Connor Schnaith, Taiyo Sogawa. 9 April 2012. Motivation. “. 5. 000 . new. malware samples per day”. --David Perry of Trend Micro. Large variance between attacks. Polymorphic attacks . Perform the same function. CS 598: Network Security. Michael Rogers & Leena Winterrowd. March 26, 2013. Types of Malware. Image courtesy of prensa.pandasecurity.com. Types of Malware. Viruses 16,82%. Trojan horses. 69.99%. A Look at Cuckoo Sandbox. Introduction. What is Malware?. (. mãl'wâr. ') - . Malicious . computer software that interferes with normal computer . functions. What is Automated Malware Analysis?. Taking what has been done by highly skilled professionals in extremely time consuming tasks and making it, quick, easy and repeatable. Automated Malware Analysis is being touted as the “Next Generation Anti-Virus” solution.. CS 598: Network Security. Michael Rogers & Leena Winterrowd. March 26, 2013. Types of Malware. Image courtesy of prensa.pandasecurity.com. Types of Malware. Viruses 16,82%. Trojan horses. 69.99%. Jason Conradt. Randy Treit. Microsoft Antimalware Engineering. SIM310. Antimalware Realities. Malware threats used to be relatively simple…. Antimalware Realities. Malware threats used to be relatively simple…. April 2015. | ©2014, Palo Alto Networks. Confidential and Proprietary.. 1. Greg Kreiling. Regional Sales Manager, Michigan. WHAT’S CHANGED?. . THE EVOLUTION OF THE . ATTACKER. $1 . CYBERCRIME NOW. Anurag Singh. Sophos . Sales Engineer. Top Threats in the US. 2. Exploits. Industrialized attacks. Flash, Downloader, JS redirect, . Malvertising. Ransomware. Dropper, Phish, Shortcut, Doc Macro. Successful attacker can earn up to . Jared Branda – Account Director – East . Real-Time, Unified Endpoint Protection. is a next-generation endpoint protection company that delivers real-time detection, prevention and remediation of advanced threats in a single platform.. Mike . Morain. Basic Lecture Structure. History of malware. Nature and operation of malware. Discuss means of identification, removal, and . prevention. Virtualization in malware. A Brief History. John Von Neumann. CSC 495/583 Advanced Topics in Computer Security Risk Assessment for Large Scale Attacks Si Chen (schen@wcupa.edu) Class 7 Why and what is malware analysis ?  To gain an understanding

Download Document

Here is the link to download the presentation.
"Automated malware classification based on network behavior"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Documents