behavior detection


Also found in: Dictionary, Thesaurus, Medical, Legal.

behavior detection

Also known as "sandboxing," it is antivirus software that monitors the executable actions of potentially malicious software and prevents certain operations from taking place. Deleting files and modifying system settings are the kinds of actions that are prohibited. Behavior detection is effective, because a polymorphic virus changes its signature (binary pattern of the file) each time another user encounters it, and a single signature cannot suffice for each type of virus. See polymorphic virus, sandbox and antivirus program.
References in periodicals archive ?
A.: SQL Injection Attack and User Behavior Detection by Using Query Tree, Fisher Score and SVM Classification.
In timing behavior detection, it is impossible to use only static image information.
In this section, we outline the proposed algorithm for detecting abnormal behavior and examine the abnormal behavior detection methods according to attack type in the form of case studies.
Indeed, McMillan says that the behavior detection process, when done manually, is a recipe for failure.
Finally, two parameters including the rate of velocity variation and the rate of direction variation are used to establish vehicle abnormal behavior detection model.
They introduce an integrated multiple behavior model for accurate abnormal behavior detection in a complex crowd scene.
We suggest that this structure, along with temporal dependencies and patterns of sequentially executed actions, can be exploited to perform deviant behavior detection on traces of agent activities over time.
By providing an industry-leading and dynamic behavior detection system, we are proactively detecting these types of threats and preventing them from infecting a system.
Shah, "Abnormal crowd behavior detection using social force model," in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR '09), pp.
We setup a simulation platform to verify the DoS behavior detection for periodic probability distribution.
The flow diagram of attack behavior detection algorithm is shown in Figure 3.

Full browser ?