ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Conference Paper Performance Analysis of Encrypted Code Analyzer for Malicious Code Detection
Cited - time in scopus Download 2 time Share share facebook twitter linkedin kakaostory
Authors
Daewon Kim, Yongsung Jeon, Jeongnyeo Kim
Issue Date
2015-11
Citation
International Conference on Communications, Computation, Networks and Technologies (INNOV) 2015, pp.1-3
Language
English
Type
Conference Paper
Project Code
15MS8200, Development of Operating System Security Core Technology for the Smart Lightweight IoT Devices , Kim Jeong Nyeo
Abstract
Signature-based malicious code detection systems cannot in real-time detect unknowns, such as polymorphic and metamorphic codes, which can be used as zero-day attacks. More serious situation is that many automated engines easily generate new malicious codes without the attacker’s special knowledge. We have already proposed a method to detect polymorphic parts of suspicious packets in anomalous network traffic. In this paper, we introduce the experiments and analysis to show the real field effectiveness and performance of our method.
KSP Keywords
Intrusion detection system(IDS), Malicious code detection, Network Traffic, Performance analysis, Real-Time, Signature-based, Zero-day attacks, field effectiveness