The Rough Set Analysis for Malicious Web Campaigns Identification

作者: Michał Kruczkowski , Mirosław Miciak

DOI: 10.1007/978-3-030-03658-4_25

关键词:

摘要: The malware (malicious software) identification has to be supported by a comprehensive and extensive analysis of data from the Internet, it is hot topic nowadays. Data mining methods are commonly used techniques for malicious software. Multi-source multi-layered nature propagation assumes utilization heterogeneous sources, i.e., taken various databases collecting samples multiple layers network ISO/OSI reference model. Unfortunately, such multi-dimensional sets complex often impossible task. In this paper we investigate multi-dimensionality reduction approach based on rough set analysis.

参考文章(15)
Rafał Kasprzyk, Andrzej Najgebauer, Dariusz Pierzchała, Modelling and Simulation of an Infection Disease in Social Networks Computational Collective Intelligence. Technologies and Applications. pp. 388- 398 ,(2011) , 10.1007/978-3-642-23935-9_38
Michał Kruczkowski, Ewa Niewiadomska-Szynkiewicz, Adam Kozakiewicz, FP-tree and SVM for Malicious Web Campaign Detection Intelligent Information and Database Systems. pp. 193- 201 ,(2015) , 10.1007/978-3-319-15705-4_19
Isabela Liane De Oliveira, André Ricardo Abed Grégio, Adriano Mauro Cansian, None, A malware detection system inspired on the human immune system international conference on computational science and its applications. pp. 286- 301 ,(2012) , 10.1007/978-3-642-31128-4_21
Jan G. Bazan, Marcin S. Szczuka, Jakub Wróblewski, A New Version of Rough Set Exploration System Lecture Notes in Computer Science. ,vol. 2475, pp. 397- 404 ,(2002) , 10.1007/3-540-45813-1_52
Michal Kruczkowski, Ewa Niewiadomska-Szynkiewicz, Adam Kozakiewicz, Cross-layer analysis of malware datasets for malicious campaigns identification military communications and information systems conference. pp. 1- 7 ,(2015) , 10.1109/ICMCIS.2015.7158682
Michal Kruczkowski, Ewa Niewiadomska Szynkiewicz, Support Vector Machine for Malware Analysis and Classification 2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT). ,vol. 2, pp. 415- 420 ,(2014) , 10.1109/WI-IAT.2014.127
Ben Y. Zhao, Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Yan Chen, Detecting and characterizing social spam campaigns internet measurement conference. pp. 35- 47 ,(2010) , 10.1145/1879141.1879147
B. Walczak, D.L. Massart, Rough sets theory Chemometrics and Intelligent Laboratory Systems. ,vol. 47, pp. 1- 16 ,(1999) , 10.1016/S0169-7439(98)00200-7
Z. Pawlak, INFORMATION SYSTEMS THEORETICAL FOUNDATIONS Information Systems. ,vol. 6, pp. 205- 218 ,(1981) , 10.1016/0306-4379(81)90023-5
Ekta Gandotra, Divya Bansal, Sanjeev Sofat, Malware Analysis and Classification: A Survey Journal of Information Security. ,vol. 5, pp. 56- 64 ,(2014) , 10.4236/JIS.2014.52006