From the course: Ethical Hacking: The Complete Malware Analysis Process

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Checking for anomalous behavior

Checking for anomalous behavior

- Some attacks don't have a specific signature that can be detected. Or haven't yet been classified with a signature, but behave in a way which can be detected as malicious activity. An anomaly detection system, or ADS is a device which watches the behavior of data streams and can detect anomalies. In general, anomaly detection systems use a learning subsystem to build a model of normal data flows and then detect deviations from the normal model and observe data flows. They're deployed initially in learning mode and then are switched to detection mode after a period of time. They may also allow the manual entry of customized profiles, providing thresholds beyond which the activity should be considered an anomaly. For instance, the number of emails sent per second from a workstation, or the number of user access attempts. There are two major classes of anomaly detection techniques. Protocol Anomalies, where the traffic does not match known ways of using the protocol or structuring the…

Contents