Classifying malware by order of network behavior artifacts

作者: Allison Mankin , Trevor Tonn , Abedelaziz Mohaisen

DOI:

关键词:

摘要: The present invention generally relates to systems and methods for classifying executable files as likely malware or benign. techniques utilize temporally-ordered network behavioral artifacts together with machine learning perform the classification. Because they rely on artifacts, disclosed may be applied obfuscated code.

参考文章(27)
Nitin Jyoti, Prabhat Kumar Singh, Palasamudram Ramagopal Prashanth, Harinath Ramachetty Vishwanath, Romanch Agarwal, System and method for non-signature based detection of malicious processes ,(2012)
Theodora Heather Titonis, Nelson Roberto Manohar-Alers, Christopher John Wysopal, Automated behavioral and static analysis using an instrumented sandbox and machine learning classification for mobile security ,(2012)
Steven K. Rogers, Richard A. Raines, Thomas E. Dube, Malware Target Recognition ,(2012)
Marc E. Seinfeld, Anil Francis Thomas, Jack Wilson Stokes, Ajith Kumar, Timothy Jon Fraser, Adrian M. Marinescu, Applying antimalware logic without revealing the antimalware logic to adversaries ,(2011)
Yuval Elovici, Boris Rozenberg, Ehud Gudes, DISTRIBUTED SYSTEM AND METHOD FOR THE DETECTION OF eTHREATS ,(2008)
Dima Stopel, Yuval Elovici, Zvi Boger, Robert Moskovitch, Yuval Shahar, Method and system for detecting malicious behavioral patterns in a computer, using machine learning ,(2007)
Konrad Rieck, Philipp Trinius, Carsten Willems, Thorsten Holz, Automatic analysis of malware behavior using machine learning Journal of Computer Security. ,vol. 19, pp. 639- 668 ,(2011) , 10.3233/JCS-2010-0410