Programmable data gathering for detecting stegomalware

A Carrega, L Caviglione, M Repetto… - 2020 6th IEEE …, 2020 - ieeexplore.ieee.org
2020 6th IEEE Conference on Network Softwarization (NetSoft), 2020ieeexplore.ieee.org
The “arm race” against malware developers requires to collect a wide variety of performance
measurements, for instance to face threats leveraging information hiding and
steganography. Unfortunately, this process could be time-consuming, lack of scalability and
cause performance degradations within computing and network nodes. Moreover, since the
detection of steganographic threats is poorly generalizable, being able to collect attack-
independent indicators is of prime importance. To this aim, the paper proposes to take …
The “arm race” against malware developers requires to collect a wide variety of performance measurements, for instance to face threats leveraging information hiding and steganography. Unfortunately, this process could be time-consuming, lack of scalability and cause performance degradations within computing and network nodes. Moreover, since the detection of steganographic threats is poorly generalizable, being able to collect attack-independent indicators is of prime importance. To this aim, the paper proposes to take advantage of the extended Berkeley Packet Filter to gather data for detecting stegomalware. To prove the effectiveness of the approach, it also reports some preliminary experimental results obtained as the joint outcome of two H2020 Projects, namely ASTRID and SIMARGL.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果