Computational Intelligent Techniques and Similarity Measures for Malware Classification

作者: M. K. Shankarpani , K. Kancherla , R. Movva , S. Mukkamala

DOI: 10.1007/978-3-642-25237-2_13

关键词:

摘要: One of the major problems concerning information security is malicious code. To evade detection, malware (unwanted piece code) packed, encrypted, and obfuscated to produce variants that continue plague properly defended patched systems networks with zero day exploits. Zero exploits are used by attackers compromise victims computer before developer target software knows about vulnerability.

参考文章(13)
Panayiotis Mavrommatis, Niels Provos, Dean McNamee, Nagendra Modadugu, Ke Wang, The ghost in the browser analysis of web-based malware conference on workshop on hot topics in understanding botnets. pp. 4- 4 ,(2007)
James P. Egan, Signal detection theory and ROC analysis Academic Press. ,(1975)
Mihai Christodorescu, Somesh Jha, Static analysis of executables to detect malicious patterns usenix security symposium. pp. 12- 12 ,(2003) , 10.21236/ADA449067
Vladimir Cherkassky, Model complexity control and statisticallearning theory Natural Computing. ,vol. 1, pp. 109- 133 ,(2002) , 10.1023/A:1015007927558
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandowski, Robert K. Cunningham, Detection of injected, dynamically generated, and obfuscated malicious code workshop on rapid malcode. pp. 76- 82 ,(2003) , 10.1145/948187.948201
Daniel J. Sanok, An analysis of how antivirus methodologies are utilized in protecting computers from malicious code information security curriculum development. pp. 142- 144 ,(2005) , 10.1145/1107622.1107655
Jeremy Z. Kolter, Marcus A. Maloof, Learning to detect malicious executables in the wild knowledge discovery and data mining. pp. 470- 478 ,(2004) , 10.1145/1014052.1014105
Yanfang Ye, Dingding Wang, Tao Li, Dongyi Ye, IMDS Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining - KDD '07. pp. 1043- 1047 ,(2007) , 10.1145/1281192.1281308
Yi-Dong Shen, Zhong Zhang, Qiang Yang, Objective-oriented utility-based association mining international conference on data mining. pp. 426- 433 ,(2002) , 10.1109/ICDM.2002.1183938
Carey Nachenberg, Computer virus-antivirus coevolution Communications of the ACM. ,vol. 40, pp. 46- 51 ,(1997) , 10.1145/242857.242869