PC Worm Detection System Based on the Correlation between User Interactions and Comprehensive Network Behaviors
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Seo, Jeongseok | - |
dc.contributor.author | Cha, Sungdeok | - |
dc.contributor.author | Zhu, Bin | - |
dc.contributor.author | Bae, Doohwan | - |
dc.date.accessioned | 2021-09-05T23:18:00Z | - |
dc.date.available | 2021-09-05T23:18:00Z | - |
dc.date.created | 2021-06-14 | - |
dc.date.issued | 2013-08 | - |
dc.identifier.issn | 1745-1361 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/102586 | - |
dc.description.abstract | Anomaly-based worm detection is a complement to existing signature-based worm detectors. It detects unknown worms and fills the gap between when a worm is propagated and when a signature is generated and downloaded to a signature-based worm detector. A major obstacle for its deployment to personal computers (PCs) is its high false positive alarms since a typical PC user lacks the skill to handle exceptions flagged by a detector without much knowledge of computers. In this paper, we exploit the feature of personal computers in which the user interacts with many running programs and the features combining various network characteristics. The model of a program's network behaviors is conditioned on the human interactions with the program. Our scheme automates detection of unknown worms with dramatically reduced false positive alarms while not compromising low false negatives, as proved by our experimental results from an implementation on Windows-based PCs to detect real world worms. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG | - |
dc.subject | SPREAD | - |
dc.title | PC Worm Detection System Based on the Correlation between User Interactions and Comprehensive Network Behaviors | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Cha, Sungdeok | - |
dc.identifier.doi | 10.1587/transinf.E96.D.1716 | - |
dc.identifier.scopusid | 2-s2.0-84882705999 | - |
dc.identifier.wosid | 000323236700015 | - |
dc.identifier.bibliographicCitation | IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E96D, no.8, pp.1716 - 1726 | - |
dc.relation.isPartOf | IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS | - |
dc.citation.title | IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS | - |
dc.citation.volume | E96D | - |
dc.citation.number | 8 | - |
dc.citation.startPage | 1716 | - |
dc.citation.endPage | 1726 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.subject.keywordPlus | SPREAD | - |
dc.subject.keywordAuthor | worm detection | - |
dc.subject.keywordAuthor | personal computer security | - |
dc.subject.keywordAuthor | Internet worm | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.