Rebuilding the Tower of Babel: Towards Cross-System Malware Information Sharing

作者: Ting Wang , Shicong Meng , Wei Gao , Xin Hu

DOI: 10.1145/2661829.2662086

关键词:

摘要: Anti-virus systems developed by different vendors often demonstrate strong discrepancies in how they name malware, which signficantly hinders malware information sharing. While existing work has proposed a plethora of naming standards, most anti-virus were reluctant to change their own conventions. In this paper we explore new, more pragmatic alternative. We propose exploit the correlation between create consensus classification, through these can share without modifying Specifically present Latin, novel classification integration framework leveraging correspondence participating as reflected heterogeneous sources at instance-instance, instance-name, and name-name levels. provide results from extensive experimental studies using real datasets concrete use cases verify efficacy Latin supporting cross-system

参考文章(21)
Federico Maggi, Andrea Bellini, Guido Salvaneschi, Stefano Zanero, Finding non-trivial malware naming inconsistencies international conference on information systems security. pp. 144- 159 ,(2011) , 10.1007/978-3-642-25560-1_10
Bin Luo, Richard C. Wilson, Edwin R. Hancock, Spectral clustering of graphs computer analysis of images and patterns. pp. 190- 201 ,(2003) , 10.1007/3-540-45028-9_17
Konrad Rieck, Philipp Trinius, Carsten Willems, Thorsten Holz, Automatic analysis of malware behavior using machine learning Journal of Computer Security. ,vol. 19, pp. 639- 668 ,(2011) , 10.3233/JCS-2010-0410
David M Blei, Andrew Y Ng, Michael I Jordan, None, Latent dirichlet allocation Journal of Machine Learning Research. ,vol. 3, pp. 993- 1022 ,(2003) , 10.5555/944919.944937
Mila Dalla Preda, Mihai Christodorescu, Somesh Jha, Saumya Debray, A semantics-based approach to malware detection symposium on principles of programming languages. ,vol. 42, pp. 377- 388 ,(2007) , 10.1145/1190215.1190270
Yanfang Ye, Tao Li, Yong Chen, Qingshan Jiang, Automatic malware categorization using cluster ensemble knowledge discovery and data mining. pp. 95- 104 ,(2010) , 10.1145/1835804.1835820
Tom Kelchner, The (in)consistent naming of malcode Computer Fraud & Security. ,vol. 2010, pp. 5- 7 ,(2010) , 10.1016/S1361-3723(10)70007-5
Ting Wang, Rachel Pottinger, SeMap: a generic mapping construction system extending database technology. pp. 97- 108 ,(2008) , 10.1145/1353343.1353359
William W. Cohen, Frank Lin, Power Iteration Clustering international conference on machine learning. pp. 655- 662 ,(2010)
Surajit Chaudhuri, Kris Ganjam, Venkatesh Ganti, Rajeev Motwani, Robust and efficient fuzzy match for online data cleaning international conference on management of data. pp. 313- 324 ,(2003) , 10.1145/872757.872796