dc.creator | Gregio | |
dc.creator | Andre; Bonacin | |
dc.creator | Rodrigo; de Marchi | |
dc.creator | Antonio Carlos; Nabuco | |
dc.creator | Olga Fernanda; de Geus | |
dc.creator | Paulo Licio | |
dc.date | 2016 | |
dc.date | 2017-11-13T13:23:01Z | |
dc.date | 2017-11-13T13:23:01Z | |
dc.date.accessioned | 2018-03-29T05:55:43Z | |
dc.date.available | 2018-03-29T05:55:43Z | |
dc.identifier | Applied Ontology. Ios Press, v. 11, p. 29 - 49, 2016. | |
dc.identifier | 1570-5838 | |
dc.identifier | 1875-8533 | |
dc.identifier | WOS:000373211700002 | |
dc.identifier | 10.3233/AO-160163 | |
dc.identifier | http://content.iospress.com/articles/applied-ontology/ao163 | |
dc.identifier | http://repositorio.unicamp.br/jspui/handle/REPOSIP/328014 | |
dc.identifier.uri | http://repositorioslatinoamericanos.uchile.cl/handle/2250/1365039 | |
dc.description | Malicious programs have been the main actors in complex, sophisticated attacks against nations, governments, diplomatic agencies, private institutions and people. Knowledge about malicious program behavior forms the basis for constructing more secure information systems. In this article, we introduce MBO, a Malicious Behavior Ontology that represents complex behaviors of suspicious executions, and through inference rules calculates their associated threat level for analytical proposals. We evaluate MBO using over two thousand unique known malware and 385 unique known benign software. Results highlight the representativeness of the MBO for expressing typical malicious activities. | |
dc.description | 11 | |
dc.description | 1 | |
dc.description | 29 | |
dc.description | 49 | |
dc.language | English | |
dc.publisher | Ios Press | |
dc.publisher | Amsterdam | |
dc.relation | Applied Ontology | |
dc.rights | fechado | |
dc.source | WOS | |
dc.subject | Security Ontology | |
dc.subject | Malware Behavior | |
dc.subject | Threat Analysis | |
dc.title | An Ontology Of Suspicious Software Behavior | |
dc.type | Artículos de revistas | |