PC Worm Detection System Based on the Correlation between User Interactions and Comprehensive Network Behaviors

Cited 1 time in webofscience Cited 2 time in scopus
  • Hit : 333
  • Download : 376
DC FieldValueLanguage
dc.contributor.authorSeo, Jeong-Seokko
dc.contributor.authorCha, Sung-Deokko
dc.contributor.authorZhu, Binko
dc.contributor.authorBae, Doo-Hwanko
dc.date.accessioned2015-01-27T02:49:33Z-
dc.date.available2015-01-27T02:49:33Z-
dc.date.created2013-09-26-
dc.date.created2013-09-26-
dc.date.issued2013-08-
dc.identifier.citationIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E96D, no.8, pp.1716 - 1726-
dc.identifier.issn0916-8532-
dc.identifier.urihttp://hdl.handle.net/10203/193179-
dc.description.abstractAnomaly-based worm detection is a complement to existing signature-based worm detectors. It detects unknown worms and fills the gap between when a worm is propagated and when a signature is generated and downloaded to a signature-based worm detector. A major obstacle for its deployment to personal computers (PCs) is its high false positive alarms since a typical PC user lacks the skill to handle exceptions flagged by a detector without much knowledge of computers. In this paper, we exploit the feature of personal computers in which the user interacts with many running programs and the features combining various network characteristics. The model of a program's network behaviors is conditioned on the human interactions with the program. Our scheme automates detection of unknown worms with dramatically reduced false positive alarms while not compromising low false negatives, as proved by our experimental results from an implementation on Windows-based PCs to detect real world worms.-
dc.languageEnglish-
dc.publisherIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG-
dc.subjectSPREAD-
dc.titlePC Worm Detection System Based on the Correlation between User Interactions and Comprehensive Network Behaviors-
dc.typeArticle-
dc.identifier.wosid000323236700015-
dc.identifier.scopusid2-s2.0-84882705999-
dc.type.rimsART-
dc.citation.volumeE96D-
dc.citation.issue8-
dc.citation.beginningpage1716-
dc.citation.endingpage1726-
dc.citation.publicationnameIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS-
dc.identifier.doi10.1587/transinf.E96.D.1716-
dc.contributor.localauthorBae, Doo-Hwan-
dc.contributor.nonIdAuthorSeo, Jeong-Seok-
dc.contributor.nonIdAuthorCha, Sung-Deok-
dc.contributor.nonIdAuthorZhu, Bin-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorworm detection-
dc.subject.keywordAuthorpersonal computer security-
dc.subject.keywordAuthorInternet worm-
dc.subject.keywordPlusSPREAD-
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 1 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0