Web: http://arxiv.org/abs/1902.02598

Jan. 13, 2022, 2:20 a.m. | Matilda Rhode, Pete Burnap, Adam Wedgbury

cs.CR updates on arXiv.org arxiv.org

Perimeter-based detection is no longer sufficient for mitigating the threat
posed by malicious software. This is evident as antivirus (AV) products are
replaced by endpoint detection and response (EDR) products, the latter allowing
visibility into live machine activity rather than relying on the AV to filter
out malicious artefacts. This paper argues that detecting malware in real-time
on an endpoint necessitates an automated response due to the rapid and
destructive nature of some malware.


The proposed model uses statistical filtering …

detection malware process time

More from arxiv.org / cs.CR updates on arXiv.org

Staff Reverse Engineer

@ Dragos, Inc. | Remote - USA

Cybersecurity Engineer

@ Sigma Defense | San Diego, California, United States

Sr Staff Engineer/Principal Engineer(Security Researcher, Security Efficacy)

@ Netskope | Bengaluru, Karnataka, India

Information Security Manager - Zurich, CH

@ Scandit | Zurich

Senior Developer C/Go (Acronis Cyber Infrastructure)

@ Acronis | Belgrade, Stari Grad, Serbia

Intermediate Security Analyst

@ ATB Financial | Calgary, Alberta, Canada