dc.creatorGregio
dc.creatorAndre; Bonacin
dc.creatorRodrigo; de Marchi
dc.creatorAntonio Carlos; Nabuco
dc.creatorOlga Fernanda; de Geus
dc.creatorPaulo Licio
dc.date2016
dc.date2017-11-13T13:23:01Z
dc.date2017-11-13T13:23:01Z
dc.date.accessioned2018-03-29T05:55:43Z
dc.date.available2018-03-29T05:55:43Z
dc.identifierApplied Ontology. Ios Press, v. 11, p. 29 - 49, 2016.
dc.identifier1570-5838
dc.identifier1875-8533
dc.identifierWOS:000373211700002
dc.identifier10.3233/AO-160163
dc.identifierhttp://content.iospress.com/articles/applied-ontology/ao163
dc.identifierhttp://repositorio.unicamp.br/jspui/handle/REPOSIP/328014
dc.identifier.urihttp://repositorioslatinoamericanos.uchile.cl/handle/2250/1365039
dc.descriptionMalicious programs have been the main actors in complex, sophisticated attacks against nations, governments, diplomatic agencies, private institutions and people. Knowledge about malicious program behavior forms the basis for constructing more secure information systems. In this article, we introduce MBO, a Malicious Behavior Ontology that represents complex behaviors of suspicious executions, and through inference rules calculates their associated threat level for analytical proposals. We evaluate MBO using over two thousand unique known malware and 385 unique known benign software. Results highlight the representativeness of the MBO for expressing typical malicious activities.
dc.description11
dc.description1
dc.description29
dc.description49
dc.languageEnglish
dc.publisherIos Press
dc.publisherAmsterdam
dc.relationApplied Ontology
dc.rightsfechado
dc.sourceWOS
dc.subjectSecurity Ontology
dc.subjectMalware Behavior
dc.subjectThreat Analysis
dc.titleAn Ontology Of Suspicious Software Behavior
dc.typeArtículos de revistas


Este ítem pertenece a la siguiente institución