Detection of Behavioral Malware in Delay Tolerant Networks
Abstract
Keywords
References
Trend Micro Inc. (2004) SYMBOS CABIR.A. [Online]. Available: http://goo.gl/aHcES
[Online]. Available: http://goo.gl/iqk7
Trend Micro Inc. (2009) IOS IKEE.A. [Online]. Available: http://goo.gl/z0j56
P. Akritidis, W. Chin, V. Lam, S. Sidiroglou, and K. Anagnostakis, “Proximity breeds danger: emerging threats in metro-area wireless networks,†in Proc. USENIX Security, 2007.
A. Lee. (2012) FBI warns: New malware threat targets travelers, infects via hotel Wi-Fi. [Online]. Available: http://goo.gl/D8vNU
NFC Forum. About NFC. [Online]. Available: http: //goo.gl/zSJqb
Wi-Fi Alliance. Wi-Fi Direct. [Online]. Available: http: //goo.gl/fZuyE
C. Kolbitsch, P. Comparetti, C. Kruegel, E. Kirda, X. Zhou, and X. Wang, “Effective and efficient malware detection at the end host,†in Proc. USENIX Security, 2009.
U. Bayer, P. Comparetti, C. Hlauschek, C. Kruegel, and E. Kirda, “Scalable, behavior-based malware clustering,†in Proc. IEEE NDSS, 2009.
D. Dash, B. Kveton, J. Agosta, E. Schooler, J. Chandrashekar, A. Bachrach, and A. Newman, “When gossip is good: Distributed probabilistic inference for detection of slow network intrusions,†in Proc. AAAI, 2006.
G. Zyba, G. Voelker, M. Liljenstam, A. M´ehes, and P. Johansson, “Defending mobile phones from proximity malware,†in Proc. IEEE INFOCOM, 2009.
F. Li, Y. Yang, and J. Wu, “CPMC: an efficient proximity malware coping scheme in smartphone-based mobile networks,†in Proc. IEEE INFOCOM, 2010.
I. Androutsopoulos, J. Koutsias, K. Chandrinos, and C. Spyropoulos, “An experimental comparison of naïve bayesian and keyword-based anti-spam filtering with personal e-mail messages,†in Proc. ACM SIGIR, 2000.
P. Graham. Better Bayesian filtering. [Online]. Available: http://goo.gl/AgHkB
J. Zdziarski, Ending spam: Bayesian content filtering and the art of statistical language classification. No Starch Press, 200 5.
R. Villamar´ın-Salom´on and J. Brustoloni, “Bayesian bot detection based on DNS traffic similarity,†in Proc. ACM SAC.
J. Agosta, C. Diuk-Wasser, J. Chandrashekar, and C. Livadas, “An adaptive anomaly detector for worm detection,†in Proc. USENIX SysML, 2007.
S. Marti, T. Giuli, K. Lai, M. Baker et al., “Mitigating routing misbehavior in mobile ad hoc networks,†in Proc. ACM MobiCom, 2000.
Refbacks
- There are currently no refbacks.
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â