Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

PC Worm Detection System Based on the Correlation between User Interactions and Comprehensive Network Behaviors

Full metadata record
DC Field Value Language
dc.contributor.authorSeo, Jeongseok-
dc.contributor.authorCha, Sungdeok-
dc.contributor.authorZhu, Bin-
dc.contributor.authorBae, Doohwan-
dc.date.accessioned2021-09-05T23:18:00Z-
dc.date.available2021-09-05T23:18:00Z-
dc.date.created2021-06-14-
dc.date.issued2013-08-
dc.identifier.issn1745-1361-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/102586-
dc.description.abstractAnomaly-based worm detection is a complement to existing signature-based worm detectors. It detects unknown worms and fills the gap between when a worm is propagated and when a signature is generated and downloaded to a signature-based worm detector. A major obstacle for its deployment to personal computers (PCs) is its high false positive alarms since a typical PC user lacks the skill to handle exceptions flagged by a detector without much knowledge of computers. In this paper, we exploit the feature of personal computers in which the user interacts with many running programs and the features combining various network characteristics. The model of a program's network behaviors is conditioned on the human interactions with the program. Our scheme automates detection of unknown worms with dramatically reduced false positive alarms while not compromising low false negatives, as proved by our experimental results from an implementation on Windows-based PCs to detect real world worms.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG-
dc.subjectSPREAD-
dc.titlePC Worm Detection System Based on the Correlation between User Interactions and Comprehensive Network Behaviors-
dc.typeArticle-
dc.contributor.affiliatedAuthorCha, Sungdeok-
dc.identifier.doi10.1587/transinf.E96.D.1716-
dc.identifier.scopusid2-s2.0-84882705999-
dc.identifier.wosid000323236700015-
dc.identifier.bibliographicCitationIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E96D, no.8, pp.1716 - 1726-
dc.relation.isPartOfIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS-
dc.citation.titleIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS-
dc.citation.volumeE96D-
dc.citation.number8-
dc.citation.startPage1716-
dc.citation.endPage1726-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.subject.keywordPlusSPREAD-
dc.subject.keywordAuthorworm detection-
dc.subject.keywordAuthorpersonal computer security-
dc.subject.keywordAuthorInternet worm-
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School > Department of Computer Science and Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Cha, Sung deok photo

Cha, Sung deok
컴퓨터학과
Read more

Altmetrics

Total Views & Downloads

BROWSE