Interception and Automating Blocking of Malicious Traffic Based on NDIS Intermediate Driver

With the evolution of malware technology, modern malware often hide its malicious behavior in various methods. One of the popular manners is to conceal the network communication. This concealment technique poses obstacles to security mechanisms which are used to detect malicious behaviors. In this...
By Lee Ling Chuan
June 30, 2011

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg