Home // INNOV 2015, The Fourth International Conference on Communications, Computation, Networks and Technologies // View article
Performance Analysis of Encrypted Code Analyzer for Malicious Code Detection
Authors:
Daewon Kim
Yongsung Jeon
Jeongnyeo Kim
Keywords: zero-day attack; malicious code; polymorphic code; unknown attack; intrusion prevention system
Abstract:
Signature-based malicious code detection systems cannot in real-time detect unknowns, such as polymorphic and metamorphic codes, which can be used as zero-day attacks. More serious situation is that many automated engines easily generate new malicious codes without the attacker’s special knowledge. We have already proposed a method to detect polymorphic parts of suspicious packets in anomalous network traffic. In this paper, we introduce the experiments and analysis to show the real field effectiveness and performance of our method.
Pages: 1 to 3
Copyright: Copyright (c) IARIA, 2015
Publication date: November 15, 2015
Published in: conference
ISSN: 2326-9286
ISBN: 978-1-61208-444-2
Location: Barcelona, Spain
Dates: from November 15, 2015 to November 20, 2015