首页> 外文会议>IEEE Conference on Network Softwarization >Programmable Data Gathering for Detecting Stegomalware
【24h】

Programmable Data Gathering for Detecting Stegomalware

机译:可编程数据收集以检测隐身软件

获取原文

摘要

The “arm race” against malware developers requires to collect a wide variety of performance measurements, for instance to face threats leveraging information hiding and steganography. Unfortunately, this process could be time-consuming, lack of scalability and cause performance degradations within computing and network nodes. Moreover, since the detection of steganographic threats is poorly generalizable, being able to collect attack-independent indicators is of prime importance. To this aim, the paper proposes to take advantage of the extended Berkeley Packet Filter to gather data for detecting stegomalware. To prove the effectiveness of the approach, it also reports some preliminary experimental results obtained as the joint outcome of two H2020 Projects, namely ASTRID and SIMARGL.
机译:与恶意软件开发者的“军备竞赛”要求收集各种各样的性能指标,例如,面对利用信息隐藏和隐写术的威胁。不幸的是,此过程可能很耗时,缺乏可伸缩性,并导致计算和网络节点内的性能下降。此外,由于隐匿性威胁的检测推广性很差,因此能够收集与攻击无关的指标至关重要。为此,本文提出利用扩展的Berkeley数据包过滤器来收集数据以检测隐身软件。为了证明这种方法的有效性,它还报告了一些初步的实验结果,这些结果是作为两个H2020项目ASTRID和SIMARGL的联合成果而获得的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号