6 research outputs found

    Analyzing CNN Based Behavioural Malware Detection Techniques on Cloud IaaS

    Full text link
    Cloud Infrastructure as a Service (IaaS) is vulnerable to malware due to its exposure to external adversaries, making it a lucrative attack vector for malicious actors. A datacenter infected with malware can cause data loss and/or major disruptions to service for its users. This paper analyzes and compares various Convolutional Neural Networks (CNNs) for online detection of malware in cloud IaaS. The detection is performed based on behavioural data using process level performance metrics including cpu usage, memory usage, disk usage etc. We have used the state of the art DenseNets and ResNets in effectively detecting malware in online cloud system. CNN are designed to extract features from data gathered from a live malware running on a real cloud environment. Experiments are performed on OpenStack (a cloud IaaS software) testbed designed to replicate a typical 3-tier web architecture. Comparative analysis is performed for different metrics for different CNN models used in this research

    Coulomb dissociation of O-16 into He-4 and C-12

    Get PDF
    We measured the Coulomb dissociation of O-16 into He-4 and C-12 within the FAIR Phase-0 program at GSI Helmholtzzentrum fur Schwerionenforschung Darmstadt, Germany. From this we will extract the photon dissociation cross section O-16(alpha,gamma)C-12, which is the time reversed reaction to C-12(alpha,gamma)O-16. With this indirect method, we aim to improve on the accuracy of the experimental data at lower energies than measured so far. The expected low cross section for the Coulomb dissociation reaction and close magnetic rigidity of beam and fragments demand a high precision measurement. Hence, new detector systems were built and radical changes to the (RB)-B-3 setup were necessary to cope with the high-intensity O-16 beam. All tracking detectors were designed to let the unreacted O-16 ions pass, while detecting the C-12 and He-4

    Detection of Running Malware Before it Becomes Malicious

    No full text
    As more vulnerabilities are being discovered every year [17], malware constantly evolves forcing improvements and updates of security and malware detection mechanisms. Malware is used directly on the attacked systems, thus anti-virus solutions tend to neutralize malware by not letting it launch or even being stored in the system. However, if malware is launched it is important to stop it as soon as the maliciousness of a new process has been detected. Following the results from [8] in this paper we show, that it is possible to detect running malware before it becomes malicious. We propose a novel malware detection approach that is capable of detecting Windows malware on the earliest stage of execution. The accuracy of more than 99% has been achieved by finding distinctive low-level behavior patterns generated before malware reaches it’s entry point. We also study the ability of our approach to detect malware after it reaches it’s entry point and to distinguish between benign executables and 10 malware families

    NF-ÎşB, inflammation, immunity and cancer: coming of age

    No full text
    corecore