Automated Reverse Engineering of Malware to Develop Network Signatures to Match with Known Network Signatures
Illicit software that seeks to steal user information, deny service, or cause general mayhem on computer networks is often discovered after the damage has been done. The ability to discover network behavior of software before a computer network is utilized would allow administrators to protect and p...
Main Author: | |
---|---|
Format: | Others |
Published: |
DigitalCommons@USU
2014
|
Subjects: | |
Online Access: | https://digitalcommons.usu.edu/etd/3315 https://digitalcommons.usu.edu/cgi/viewcontent.cgi?article=4306&context=etd |