作者: Konrad Rieck , Thorsten Holz , Carsten Willems , Patrick Düssel , Pavel Laskov
DOI: 10.1007/978-3-540-70542-0_6
关键词: Computer security 、 Software 、 Computer virus 、 Malware 、 Exploit 、 The Internet 、 Trojan 、 Machine learning 、 Artificial intelligence 、 Honeypot 、 Computer science 、 Discriminative model
摘要: … for classification of malware and propose a method for learning and discrimination of malware behavior. Our method proceeds in three stages:(a) behavior of collected malware is …