Simulating malware with MAlSim

R Leszczyna, I Nai Fovino, M Masera - Journal in computer virology, 2010 - Springer
Abstract This paper describes MAlSim—Mobile Agent Malware Simulator—a mobile agent
framework developed to address one of the most important problems related to the …

Malsim-mobile agent malware simulator

R Leszczyna, IN Fovino, M Masera - 1st International ICST Conference on …, 2010 - eudl.eu
One of the problems related to the simulation of attacks against critical infrastructures is the
lack of adequate tools for the simulation of malicious software (malware). Malware attacks …

[PDF][PDF] Evaluation of agent platforms

R Leszczyna - Proceedings of the Fifth International …, 2004 - publications.jrc.ec.europa.eu
Agent platform is a technological architecture providing the environment in which agents can
actively exist and operate to achieve their goals. The agent platform may additionally …

Approach to security assessment of critical infrastructures' information systems

R Leszczyna, IN Fovino, M Masera - IET Information Security, 2011 - IET
This study presents an approach to the security assessment of the information systems of
critical infrastructures. The approach is based on the faithful reconstruction of the evaluated …

Amun: automatic capturing of malicious software

J Göbel - 2010 - dl.gi.de
This paper describes the low-interaction server honeypot Amun. Through the use of
emulated vulnerabilities Amun aims at capturing malware in an automated fashion. The use …

Application of the SAMA methodology to Ryuk malware

AG Masid, JB Higuera, JRB Higuera… - Journal of Computer …, 2023 - Springer
Malware analysis is an essential discipline for understanding the nature, attack vectors, and
weaknesses of systems to combat the threats that emerge every day in the IT security world …

Building malware infection trees

JA Morales, M Main, W Luo, S Xu… - 2011 6th International …, 2011 - ieeexplore.ieee.org
Dynamic analysis of malware is an ever evolving and challenging task. A malware infection
tree (MiT) can assist in analysis by identifying processes and files related to a specific …

Agent‐based modeling of malware dynamics in heterogeneous environments

A Bose, KG Shin - Security and Communication Networks, 2013 - Wiley Online Library
The increasing convergence of power‐law networks such as social networking and peer‐to‐
peer applications, web‐delivered applications, and mobile platforms makes today's users …

[PDF][PDF] Micael: An Autonomous Mobile Agent System to Protect New Generation Networked Applications.

JD De Queiroz, LFR da Costa Carmo… - Recent Advances in …, 1999 - academia.edu
Here we present a research project to create and deploy an Intrusion Detection System
based on Autonomous Mobile Software Agents. An Intrusion Detection System is an …

Collaborative architecture for malware detection and analysis

M Colajanni, D Gozzi, M Marchetti - IFIP International Information Security …, 2008 - Springer
The constant increase of malware threats clearly shows that the present countermeasures
are not sufficient especially because most actions are put in place only when infections have …