메뉴 건너뛰기




Volumn , Issue , 2007, Pages 169-177

Detection of unknown computer worms activity based on computer behavior using data mining

Author keywords

[No Author keywords available]

Indexed keywords

CLASSIFICATION (OF INFORMATION); COMPUTER ARCHITECTURE; DATA MINING; FEATURE EXTRACTION; INTRUSION DETECTION; WORLD WIDE WEB;

EID: 34548765680     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CISDA.2007.368150     Document Type: Conference Paper
Times cited : (12)

References (31)
  • 2
  • 4
    • 18844362133 scopus 로고    scopus 로고
    • Abou-Assaleh, T, Cercone, N, Keselj, V, and Sweidan, R, 2004) N-gram based Detection of New Malicious Code, Proceedings of the 28th Annual International Computer Software and Applications Conference COMPSAC'04
    • Abou-Assaleh, T., Cercone, N., Keselj, V., and Sweidan, R. (2004) N-gram based Detection of New Malicious Code, Proceedings of the 28th Annual International Computer Software and Applications Conference (COMPSAC'04)
  • 5
    • 12244279567 scopus 로고    scopus 로고
    • Kolter, J.Z. and Matoof, M.A.(2004). Learning to detect malicious executables in the wild. In Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 470-478. New York, NY: ACM Press.
    • Kolter, J.Z. and Matoof, M.A.(2004). Learning to detect malicious executables in the wild. In Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 470-478. New York, NY: ACM Press.
  • 7
    • 17644421307 scopus 로고    scopus 로고
    • Kienzle, D.M. and Elder, M.C. (2003) Recent worms: a survey and trends. In Proceedings of the 2003 ACM Workshop on Rapid Malcode, pages 1-10. ACM Press, October 27, 2003.
    • Kienzle, D.M. and Elder, M.C. (2003) Recent worms: a survey and trends. In Proceedings of the 2003 ACM Workshop on Rapid Malcode, pages 1-10. ACM Press, October 27, 2003.
  • 9
    • 12244311689 scopus 로고    scopus 로고
    • Weaver, N. Paxson, V. Staniford, and S. Cunningham, R. (2003) A Taxonomy of Computer Worms, Proceedings of the 2003 ACM workshop on Rapid Malcode, Washington, DC, October 2003, pages 11-18
    • Weaver, N. Paxson, V. Staniford, and S. Cunningham, R. (2003) A Taxonomy of Computer Worms, Proceedings of the 2003 ACM workshop on Rapid Malcode, Washington, DC, October 2003, pages 11-18
  • 10
    • 34548794669 scopus 로고    scopus 로고
    • CERT, CERT Advisory CA-2000-04, Love Letter Worm, http://www.cert.org/ advisories/ca-2000-04.html
    • CERT, CERT Advisory CA-2000-04, Love Letter Worm, http://www.cert.org/ advisories/ca-2000-04.html
  • 11
    • 84940104123 scopus 로고    scopus 로고
    • Lee, W., Stolfo, S.J. and Mok, K.W. (1999). A data mining framework for building intrusion detection models. In Proceedings of the 1999 IEEE Symposium on Security and Privacy, May 1999
    • Lee, W., Stolfo, S.J. and Mok, K.W. (1999). A data mining framework for building intrusion detection models. In Proceedings of the 1999 IEEE Symposium on Security and Privacy, May 1999
  • 14
    • 2442526701 scopus 로고    scopus 로고
    • Ste. Zanero and Sergio M. Savaresi, Unsupervised, learning techniques for an intrusion detection system, in Proceedings of the 2004 ACM symposium on Applied computing, pp. 412-419, Nicosia, Cyprus, Mar. 2004. ACM Press.
    • Ste. Zanero and Sergio M. Savaresi, "Unsupervised, learning techniques for an intrusion detection system," in Proceedings of the 2004 ACM symposium on Applied computing, pp. 412-419, Nicosia, Cyprus, Mar. 2004. ACM Press.
  • 15
    • 17544388668 scopus 로고    scopus 로고
    • H. Gunes Kayacik, A. Nur Zincir-Heywoodi and Malcolm I. Heywood, On the capability of a som based intrusion detection System, in Proceedings of the International Joint Conference on Neural Networks, 3, pp. 1808-1813. IEEE, IEEE, July 2003.
    • H. Gunes Kayacik, A. Nur Zincir-Heywoodi and Malcolm I. Heywood, On the capability of a som based intrusion detection System, in Proceedings of the International Joint Conference on Neural Networks, vol. 3, pp. 1808-1813. IEEE, IEEE, July 2003.
  • 19
    • 34548786592 scopus 로고    scopus 로고
    • Susan M. Bridges and M, Vaughn Rayford, Fuzzy data mining and genetic algorithms applied to intrusion detection, in Proceedings of the Twenty-third National Information Systems Security Conference. National Institute of Standards and Technology, Oct. 2000.
    • Susan M. Bridges and M, Vaughn Rayford, "Fuzzy data mining and genetic algorithms applied to intrusion detection," in Proceedings of the Twenty-third National Information Systems Security Conference. National Institute of Standards and Technology, Oct. 2000.
  • 20
    • 0038103911 scopus 로고    scopus 로고
    • Utilising fuzzy logic and trend analysis for effective intrusion detection
    • M. Botha and R. von Solms, "Utilising fuzzy logic and trend analysis for effective intrusion detection," Computers & Security, vol. 22, no. 5, pp. 423-434, 2003.
    • (2003) Computers & Security , vol.22 , Issue.5 , pp. 423-434
    • Botha, M.1    von Solms, R.2
  • 21
    • 34548786001 scopus 로고    scopus 로고
    • (133/2006) Robert Moskovitch, Ido Gus, Shay Pluderman, Dima Stopel, Yisrael Fermat, Yuval Shahar, and Yuval Elovici, Host Based Intrusion Detection Using Machine Learning, Faculty of Engineering, Ben Gurion Unversity, Israel (2006).
    • (133/2006) Robert Moskovitch, Ido Gus, Shay Pluderman, Dima Stopel, Yisrael Fermat, Yuval Shahar, and Yuval Elovici, Host Based Intrusion Detection Using Machine Learning, Faculty of Engineering, Ben Gurion Unversity, Israel (2006).
  • 22
    • 0003592399 scopus 로고    scopus 로고
    • The VTrace tool: Building a system tracer for Windows NT and Windows 2000
    • October
    • Lorch, J. and Smith, A. J. (2000), The VTrace tool: building a system tracer for Windows NT and Windows 2000. MSDN Magazine, 15(10):86-102, October 2000.
    • (2000) MSDN Magazine , vol.15 , Issue.10 , pp. 86-102
    • Lorch, J.1    Smith, A.J.2
  • 24
    • 34548731194 scopus 로고
    • C4.5: Programs for machine learning
    • San Francisco, CA, USA
    • Quinlan, J.R. (1993). C4.5: programs for machine learning. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA.
    • (1993) Morgan Kaufmann Publishers Inc
    • Quinlan, J.R.1
  • 26
    • 4644347255 scopus 로고    scopus 로고
    • A Selective Sampling Approach to Active Selection
    • H Liu, H Motoda and L YU, A Selective Sampling Approach to Active Selection, Artificial Intelligence, 159 (2004) 49-74.
    • (2004) Artificial Intelligence , vol.159 , pp. 49-74
    • Liu, H.1    Motoda, H.2    YU, L.3
  • 27
    • 0031269184 scopus 로고    scopus 로고
    • On the optimality of simple Bayesian classifier under zero-one loss
    • Domingos, P., and Pazzani, M. (1997) On the optimality of simple Bayesian classifier under zero-one loss, Machine Learning, 29:103-130.
    • (1997) Machine Learning , vol.29 , pp. 103-130
    • Domingos, P.1    Pazzani, M.2
  • 28
    • 46149134436 scopus 로고
    • Fusion, propagation, and structuring in belief networks
    • Pearl J., (1986) Fusion, propagation, and structuring in belief networks. Artificial Intelligence 29(3):241-288.
    • (1986) Artificial Intelligence , vol.29 , Issue.3 , pp. 241-288
    • Pearl, J.1
  • 30
    • 34548709532 scopus 로고    scopus 로고
    • Demuth, H. and Beale, (1998) M. Neural Network toolbox for use with Matlab. The Mathworks Inc., Natick, MA.
    • Demuth, H. and Beale, (1998) M. Neural Network toolbox for use with Matlab. The Mathworks Inc., Natick, MA.
  • 31
    • 85164392958 scopus 로고
    • A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection
    • Kohavi, R., (1995) A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection, International Joint Conference in Artificial Intelligence, 1137-1145, 1995
    • (1995) International Joint Conference in Artificial Intelligence , pp. 1137-1145
    • Kohavi, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.