期刊名称:International Journal of Engineering and Computer Science
印刷版ISSN:2319-7242
出版年度:2014
卷号:3
期号:10
页码:8699-8703
出版社:IJECS
摘要:In the era of internet the probability of system or application being vulnerable to malwares such as viruses, Trojans, botnets etc.has provoked data corruption, data manipulation, security breaching and so on. Different techniques like antivirus and firewalls haveemerged to combat against malware attacks. However existing signature based detections are unable to counteract anomalous behaviour ofspecific applications. There exist various behaviour based techniques which detects malic
关键词:malwares; signature; anomaly; system calls; automaton