The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recent malware processes are armed with stealthy techniques to detect, subvert malware detection facilities of the victim. Traditional host-based detection tools execute inside the very hosts they are protecting, which makes them vulnerable to deceive and subvert. To address this limitation, improve the effectiveness and accuracy of detection, and boost the ability of tamper resistance, a VMM-based...
Over the past years malicious software has evolved to a persistent threat on all major computer platforms. Due tothe high number of new threats which are released every day security researchers have developed automatic systems toanalyze and classify unknown pieces of software. While these techniques are technically mature on the Windows platformthey still have to be improved on many other platforms...
Cloud computing is a technological advancement that provide resources through internet on pay-as-you-go basis. Cloud computing uses virtualisation technology to enhance the efficiency and effectiveness of its advantages. Virtualisation is the key to consolidate the computing resources to run multiple instances on each hardware, increasing the utilization rate of every resource, thus reduces the number...
The Net Maneuver Commander (NMC) is a research prototype cyber command and control (C2) system which constantly maneuvers network-based elements preemptively to improve network resiliency in a cyber compromised environment. Similar in concept to a frequency hopping radio, Network Maneuver Commander transparently and preemptively provides a moving target defense to evade attack. It utilizes randomization...
Virtualization is an emerging technology which offers organizations with a range of benefits but still suffers from some potential security challenges. This review paper mainly emphasizes on several security challenges that virtualization technology may introduce to an IT environment. However, the main contribution of the paper lies in summarizing the progress of various individuals in the field of...
Traditional operating systems and applications use logs extensively to monitor system activity and perform intrusion detection. Consequently, logs have also become prime targets for intruders. When a malware or intruder obtains root privileges in a system, one of its first actions is to hide its footprint by deleting or modifying system logs, especially the log entry recording the intrusion activity...
Auditable file system is used to track the usage of the file system including the operations like read and write. Auditable file system keeps the trails of userspsila action and the trails are kept faithfully for future auditing. However, as the logs are still kept within the same file system, it will be quite vulnerable to be exposed as malware penetrating the system. Even with the file system hiding...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.