Voir la notice de l'article provenant de la source Math-Net.Ru
@article{MAIS_2024_31_2_a2, author = {Yu. V. Kosolapov and T. A. Pavlova}, title = {On the study of one way to detect anomalous program execution}, journal = {Modelirovanie i analiz informacionnyh sistem}, pages = {152--163}, publisher = {mathdoc}, volume = {31}, number = {2}, year = {2024}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/MAIS_2024_31_2_a2/} }
TY - JOUR AU - Yu. V. Kosolapov AU - T. A. Pavlova TI - On the study of one way to detect anomalous program execution JO - Modelirovanie i analiz informacionnyh sistem PY - 2024 SP - 152 EP - 163 VL - 31 IS - 2 PB - mathdoc UR - http://geodesic.mathdoc.fr/item/MAIS_2024_31_2_a2/ LA - ru ID - MAIS_2024_31_2_a2 ER -
Yu. V. Kosolapov; T. A. Pavlova. On the study of one way to detect anomalous program execution. Modelirovanie i analiz informacionnyh sistem, Tome 31 (2024) no. 2, pp. 152-163. http://geodesic.mathdoc.fr/item/MAIS_2024_31_2_a2/
[1] Lee, Kyungroul and Lee, Jaehyuk and Yim, Kangbin, “Classification and analysis of malicious code detection techniques based on the APT attack”, Applied Sciences, 13:5 (2023), 2894 | DOI
[2] Hofmeyr, A. and Forrest, S. and Somayaji, A., “Intrusion detection using sequences of system calls”, Journal of computer security, 6:3 (1998), 151–180 | DOI
[3] Wagner, D. and Soto, P., “Mimicry attacks on host-based intrusion detection systems”, Proceedings of the 9th ACM conference on Computer and communications security, 2002, 255–264 | DOI
[4] Kosolapov, Yu., “On one method for detecting exploitation of vulnerabilities and its parameters”, Systems and Means of Informatics, 31:4 (2021), 48–60 (in Russian)
[5] Kosolapov, Yu., “On the Detection of Exploitation of Vulnerabilities That Leads to the Execution of a Malicious Code”, Automatic Control and Computer Sciences, 55 (2021), 827–837 | DOI
[6] Rohitab Batra, API monitor, 2013 (2024-04-21) http://www.rohitab.com/apimonitor
[7] Kechahmadze, A. and Kosolapov, Yu., “Method for detecting exploits based on the profile of differences between function call addresses”, Informatika i sistemy upravleniya, 73:3 (2022), 106–116 (in Russian) | DOI
[8] Exploit Protection Reference, 2023 (2024-04-21) https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/exploit-protection-reference?view=o365-worldwide
[9] Sweigart, Al, PyAutoGUI documentation, 2021 (2024-04-21) https://readthedocs.org/projects/pyautogui/downloads/pdf/latest/
[10] Ding, Yu and Wei, Tao and Xue, Hui and Zhang, Yulong and Zhang, Chao and Han, Xinhui, “Accurate and efficient exploit capture and classification”, Science China. Information Sciences, 60 (2017), 052110:1–052110:17 | DOI