The tag has no wiki summary.

learn more… | top users | synonyms

2
votes
2answers
106 views

Is interpreted malware easier to detect than compiled malware?

Is compiled code more of a security risk than interpreted code? I'm under the impression that it is due to the fact that compiled code can hide malicious code from malware scans.
7
votes
1answer
76 views

Is there a public database of mutex names that are associated with malware?

I remember seeing something like this a while back, and it'd be incredibly useful for a project I'm working on. Essentially there was a list of mutex names, with a list of malware identifiers (e.g. ...
0
votes
0answers
132 views

Snort Parallelization Techniques and its effect on DDOS detection capability

I want to ask a query about snort parallelization. 1) Can snort detection rate remains same for all attacks after parallelisation? 2) As the parallelisation of netowrk traffic in each core is based ...
0
votes
1answer
63 views

Mechanisms to detect service abuse in the cloud

I want to ask if it is possible to detect the abuse of a service in the cloud. How can the SaaS provider be sure that the client does not use the service for criminal acts? For example how can Google ...
3
votes
2answers
138 views

Why some antiviruses detect viruses and some not?

I am curious why some anti-viruses detect viruses and some do not. From what I found online, antiviruses parse the binary files and check the sequence of code which is malicious(exists in virus ...
-2
votes
1answer
241 views

Foolproof Jailbreak detection? [closed]

I went through various posts which talks about jailbreak detection mechanisms. Whatever I came across is either something that apple would reject during the vetting process or something that could be ...
2
votes
2answers
151 views

Analyzing Network Anomalies for Malicious events

For a network security project we are listing to our network traffic of about 50-60 hosts. We aim at identifying malicious event within our network traffic by identifying network anomalies. Our main ...
0
votes
0answers
21 views

Steganalysis of outgoing traffic [duplicate]

Possible Duplicate: Detecting Steganography in images Is there any commercial traffic monitoring systems that implements steganalysis and could issue a warning upon suspicious file transfer ...
1
vote
4answers
260 views

Are malicious scripts in batch files detected by antiviruses?

we have many scripts in shared folders in our IT Department. Are malicious scripts in batch files detected by antiviruses?
1
vote
2answers
384 views

How effective is Windows Task Manager at identifying keyloggers?

I just hit upon an idea I have used in the past to distinguish between two instances of the same program, one of which was hung. While Task Manager is open and visible and sorted by CPU usage, I pick ...
3
votes
1answer
373 views

How to detect/list rogue computers connected to a WIFI network without access to the Wifi Router interface?

This is what I believe to be an interesting challenge :) A relative (that lives a bit too far to go there in person) is complaining that their WIFI/Internet network performance has gone down ...
2
votes
3answers
210 views

Repudiation in Copyright Infringement (BitTorrent)

Seeing this question : How did an alleged illegal downloading be detected? sparked a question I have had for a long time. How does repudiation/non-repudiation work in such cases ? Argument: It is ...
1
vote
3answers
376 views

How can alleged illegal downloading be detected?

Joel Tenenbaum was accused of illegally downloading 30 songs. How might his action have been detected? Can anyone show a concrete method? Update Using a honey pot or monitoring the peers list makes ...
10
votes
2answers
275 views

Profiling hackers with keystroke dynamics

I am writing a research paper on tracking hackers and how to include keystroke timings to create a profile of hackers. I want to combine the keystroke timings that I capture in ttylog with other data ...
0
votes
2answers
177 views

Easy way to analyse my netstats for intrusions?

I want to analyse my network traffic against intrusions or hackers. I looked at Snort but it seems difficult to install on Windows and overly complex anyway. When I issue a netstat -a, I see various ...

1 2 3
15 30 50 per page