System Maintenance:
There may be intermittent impact on performance while updates are in progress. We apologize for the inconvenience.
By Topic

An experimental analysis for malware detection using extrusions

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Behal, S. ; Deptt of Comput. Sci. & Eng., Shaheed Bhagat Singh Coll. of Eng. & Technol., Ferozepur, India ; Kumar, K.

Today, the comprehensive protection of a computer network from malware is extremely important. The increasing usage of interactive internet applications in the areas of stock trades, medicine, weather forecasting, banks, businesses, education, defense, research etc. has induced a rise in risks and possibilities of misuse of computer networks. Over the last decade, malicious software or malware in the form of viruses, worms, Trojan horses, Botnets has risen to become a primary source of most of the threats used for scanning, distributed denial-of-service (DDoS) activities and direct attacks, taking place across the Internet. A number of solutions have been proposed in literature to defend against such threats from malware. Majority of these solutions uses the concept of inbound traffic approach for detection. The main goal of this paper is to work out a pragmatic solution to protect the network from the malware by exploring the feasibility of the concept of analysis of outbound traffic i.e Extrusion traffic only instead of intrusion traffic. Four different types of malware have been analyzed to check the validity of the proposed approach.

Published in:

Computer and Communication Technology (ICCCT), 2011 2nd International Conference on

Date of Conference:

15-17 Sept. 2011