메뉴 건너뛰기




Volumn , Issue , 2008, Pages 301-310

McBoost: Boosting scalability in malware collection and analysis using statistical classification of executables

Author keywords

[No Author keywords available]

Indexed keywords

CLASSIFIERS; CODES (SYMBOLS); COMPUTER CRIME; LEARNING SYSTEMS; SCALABILITY; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 60649088451     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSAC.2008.22     Document Type: Conference Paper
Times cited : (132)

References (26)
  • 3
    • 0030211964 scopus 로고    scopus 로고
    • Bagging predictors
    • L. Breiman. Bagging predictors. Machine Learning, 24(2):123-140, 1996.
    • (1996) Machine Learning , vol.24 , Issue.2 , pp. 123-140
    • Breiman, L.1
  • 5
    • 21844435105 scopus 로고    scopus 로고
    • Confidence intervals for the area under the roc curve
    • Advances in Neural Information Processing Systems
    • C. Cortes and M. Mohri. Confidence intervals for the area under the roc curve. In NIPS 2004: Advances in Neural Information Processing Systems, 2004.
    • (2004) NIPS 2004
    • Cortes, C.1    Mohri, M.2
  • 9
    • 33845768389 scopus 로고    scopus 로고
    • Learning to detect and classify malicious executables in the wild
    • J. Z. Kolter and M. A. Maloof. Learning to detect and classify malicious executables in the wild. Journal of Machine Learning Research, 7:2721-2744, 2006.
    • (2006) Journal of Machine Learning Research , vol.7 , pp. 2721-2744
    • Kolter, J.Z.1    Maloof, M.A.2
  • 12
    • 60349101742 scopus 로고    scopus 로고
    • Using an ensemble of one-class svm classifiers to harden payload-based anomaly detection systems
    • R. Perdisci, G. Gu, and W. Lee. Using an ensemble of one-class svm classifiers to harden payload-based anomaly detection systems. In International Conference on Data Mining (ICDM), 2006.
    • (2006) International Conference on Data Mining (ICDM)
    • Perdisci, R.1    Gu, G.2    Lee, W.3
  • 13
    • 50149118846 scopus 로고    scopus 로고
    • Classification of packed executables for accurate computer virus detection
    • R. Perdisci, A. Lanzi, and W. Lee. Classification of packed executables for accurate computer virus detection. Patter Recognition Letters, 29(14):1941-1946, 2008.
    • (2008) Patter Recognition Letters , vol.29 , Issue.14 , pp. 1941-1946
    • Perdisci, R.1    Lanzi, A.2    Lee, W.3
  • 21
    • 84904088330 scopus 로고    scopus 로고
    • Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities
    • Y. Wang, D. Beck, X. Jiang, R. Roussev, C. Verbowski, S. Chen, and S. T. King. Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities. In NDSS, 2006.
    • (2006) NDSS
    • Wang, Y.1    Beck, D.2    Jiang, X.3    Roussev, R.4    Verbowski, C.5    Chen, S.6    King, S.T.7
  • 26
    • 66749177958 scopus 로고    scopus 로고
    • Collecting autonomous spreading malware using high-interaction honeypots
    • J. Zhuge, T. Holz, X. Han, C. Song, and W. Zou. Collecting autonomous spreading malware using high-interaction honeypots. In ICICS 2007, 2007.
    • (2007) ICICS 2007
    • Zhuge, J.1    Holz, T.2    Han, X.3    Song, C.4    Zou, W.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.