Data Mining Tools for Malware Detection

作者: Mehedy Masud , Latifur Khan , Bhavani Thuraisingham

DOI:

关键词: Data managementIdentification (information)Semantic WebBotnetInsider threatData miningMalwareData stream miningComputer scienceExploit

摘要: Although the use of data mining for security and malware detection is quickly on rise, most books subject provide high-level theoretical discussions to near exclusion practical aspects. Breaking mold, Data Mining Tools Malware Detection provides a step-by-step breakdown how develop tools detection. Integrating theory with techniques experimental results, it focuses applications email worms, malicious code, remote exploits, botnets. The authors describe systems they have designed developed: worm using mining, scalable multi-level feature extraction technique detect executables, detecting exploits flow-based identification botnet traffic by multiple log files. For each these tools, detail system architecture, algorithms, performance limitations. Discusses emerging applications, including adaptable detection, insider threat firewall policy analysis, real-time Includes four appendices that firm foundation in management, secure systems, semantic web Describes stream From algorithms this one few will be equally valuable those industry, government, academia. It help technologists decide which select specific managers learn determine whether or not proceed project, developers find innovative alternative designs range applications.

参考文章(8)
E. F. Codd, A Relational Model of Data for Large Shared Data Banks (Reprint). Communications of The ACM. ,vol. 26, pp. 64- 69 ,(1983)
Amit P. Sheth, James A. Larson, Federated database systems for managing distributed, heterogeneous, and autonomous databases ACM Computing Surveys. ,vol. 22, pp. 183- 236 ,(1990) , 10.1145/96602.96604
J. Hendler, Agents and the Semantic Web IEEE Intelligent Systems. ,vol. 16, pp. 30- 37 ,(2001) , 10.1109/5254.920597
Elisa Bertino, Elena Ferrari, Vijay Atluri, The specification and enforcement of authorization constraints in workflow management systems ACM Transactions on Information and System Security. ,vol. 2, pp. 65- 104 ,(1999) , 10.1145/300830.300837
Darrell Woelk, Won Kim, Willis Luther, An object-oriented approach to multimedia databases international conference on management of data. ,vol. 15, pp. 311- 325 ,(1986) , 10.1145/16856.16885
E. Bertino, B. Carminati, E. Ferrari, B. Thuraisingham, Amar Gupta, Selective and authentic third-party distribution of XML documents IEEE Transactions on Knowledge and Data Engineering. ,vol. 16, pp. 1263- 1278 ,(2004) , 10.1109/TKDE.2004.63
E. Bertino, L.R. Khan, R. Sandhu, B. Thuraisingham, Secure knowledge management: confidentiality, trust, and privacy systems man and cybernetics. ,vol. 36, pp. 429- 438 ,(2006) , 10.1109/TSMCA.2006.871796
Bhavani Thuraisingham, Amar Gupta, Elisa Bertino, Elena Ferrari, Collaborative Commerce and Knowledge Management Knowledge and Process Management. ,vol. 9, pp. 43- 53 ,(2002) , 10.1002/KPM.132