메뉴 건너뛰기




Volumn 4667 LNAI, Issue , 2007, Pages 44-50

Applying machine learning techniques for detection of malicious code in network traffic

Author keywords

Feature selection; Machine learning; Malicious code; Network Service Provider (NSP)

Indexed keywords

ALGORITHMS; BAYESIAN NETWORKS; FEATURE EXTRACTION; NEURAL NETWORKS;

EID: 38349051945     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-74565-5_5     Document Type: Conference Paper
Times cited : (65)

References (15)
  • 1
    • 38349041265 scopus 로고    scopus 로고
    • NCSA Study, http://www.staysafeonline.info/pdf/safety_study_2005.pdf
    • NCSA Study, http://www.staysafeonline.info/pdf/safety_study_2005.pdf
  • 2
    • 38349012637 scopus 로고    scopus 로고
    • Symantec Internet Security Threat Report January-June
    • Symantec Internet Security Threat Report (January-June 2004), www.symantec.com
    • (2004)
  • 4
    • 34547152659 scopus 로고    scopus 로고
    • Symantec 2006 Security Report, http://www.symantec.com/specprog/ threatreport/ entwhitepaper_symantec_internet_security_threat_report_×
    • (2006) Security Report
    • Symantec1
  • 5
    • 38349017753 scopus 로고    scopus 로고
    • Tahan, G, Glezer, C, Elovici, Y, eDare- Early Detection Alert and Response to Electronic Threats, Working Paper, Deutsche Telekom Labs at Ben Gurion University
    • Tahan, G., Glezer, C., Elovici, Y.: eDare- Early Detection Alert and Response to Electronic Threats, Working Paper, Deutsche Telekom Labs at Ben Gurion University
  • 7
    • 18844362133 scopus 로고    scopus 로고
    • Abou-Assaleh, T, Cercone, N, Keselj, V, Sweidan, R, N-gram based Detection of New Malicious Code. In: Proc. of the 28th Annual International Computer Software and Applications Conference COMPSAC'04, 2004
    • Abou-Assaleh, T., Cercone, N., Keselj, V., Sweidan, R.: N-gram based Detection of New Malicious Code. In: Proc. of the 28th Annual International Computer Software and Applications Conference (COMPSAC'04) (2004)
  • 9
    • 38349077779 scopus 로고    scopus 로고
    • Quinlan, J.R.: C4.5: Programs for machine learning. Morgan Kaufmann Publishers Inc., San Francisco (1993)
    • Quinlan, J.R.: C4.5: Programs for machine learning. Morgan Kaufmann Publishers Inc., San Francisco (1993)
  • 10
    • 38349072982 scopus 로고    scopus 로고
    • Weka software
    • Weka software, http://www.cs.waikato.ac.nz/ml/weka/
  • 11
    • 46149134436 scopus 로고
    • Fusion, propagation, and structuring in belief networks
    • Pearl, J.: Fusion, propagation, and structuring in belief networks. Artificial Intelligence 29(3), 241-288 (1986)
    • (1986) Artificial Intelligence , vol.29 , Issue.3 , pp. 241-288
    • Pearl, J.1
  • 15
    • 0001931577 scopus 로고    scopus 로고
    • An empirical comparison of voting classification Algorithms. Bagging, Boosting, and Variants
    • Bauer, E., Kohavi, R.: An empirical comparison of voting classification Algorithms. Bagging, Boosting, and Variants. Machine Learning 35, 1-38 (1999)
    • (1999) Machine Learning , vol.35 , pp. 1-38
    • Bauer, E.1    Kohavi, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.