Matrix factorization for automated malware detection

作者: Elad Ziklik , Corina Feuerstein , Royi Ronen , Efim Hudis , Tomar Brand

DOI:

关键词:

摘要: Disclosed herein is a system and method for automatically identifying potential malware files or benign in that are not known to be malware. Vector distances select features of the compared vectors both files. Based on distance measures score obtained unknown file. If exceeds threshold researcher may notified malware, file classified as if significantly high.

参考文章(25)
Yuval Shahar, Lior Rokach, Gil Tahan, Mal-ID: automatic malware detection using common segment analysis and meta-features Journal of Machine Learning Research. ,vol. 13, pp. 949- 979 ,(2012)
Nikos Karampatziakis, Jack W. Stokes, Anil Thomas, Mady Marinescu, Using file relationships in malware classification international conference on detection of intrusions and malware and vulnerability assessment. pp. 1- 20 ,(2012) , 10.1007/978-3-642-37300-8_1
Nitin Jyoti, Prabhat Kumar Singh, Palasamudram Ramagopal Prashanth, Harinath Ramachetty Vishwanath, Romanch Agarwal, System and method for non-signature based detection of malicious processes ,(2012)
Theodora Heather Titonis, Nelson Roberto Manohar-Alers, Christopher John Wysopal, Automated behavioral and static analysis using an instrumented sandbox and machine learning classification for mobile security ,(2012)
Dima Stopel, Yuval Elovici, Zvi Boger, Robert Moskovitch, Yuval Shahar, Method and system for detecting malicious behavioral patterns in a computer, using machine learning ,(2007)
William E. Sterns, Monty D. McDougal, Brian N. Smith, Randy S. Jennings, Jesse J. Lee, Jeffrey C. Brown, Michael K. Daly, Kevin L. Cariker, Darin J. De Rita, System and method for malware detection ,(2010)
Tammo Krueger, Nicole Krämer, Konrad Rieck, ASAP: automatic semantics-aware analysis of network payloads privacy and security issues in data mining and machine learning. pp. 50- 63 ,(2010) , 10.1007/978-3-642-19896-0_5
Aamer Hydrie, Liang Ge, Wei Wei Ada Cho, Stephen R. Husak, Media content catalog service ,(2006)
Craig Sprosts, Scot Kennedy, Larry Rosenstein, Daniel Quinlan, Craig Taylor, Michael Olivier, Method and apparatus for managing computer virus outbreaks ,(2004)
Carey S. Nachenberg, William E. Sobel, Temporal access control for computer virus prevention ,(2002)