메뉴 건너뛰기




Volumn , Issue , 2010, Pages 295-302

Detection of spyware by mining executable files

Author keywords

Data Mining; Feature extraction; Malicious code; Spyware detection

Indexed keywords

BINARY FEATURES; COMPUTER USERS; EXECUTABLE FILES; LOSS OF CONTROL; MALICIOUS CODES; N-GRAMS; PRIVATE DATA; SPY-WARE; SPYWARE DETECTION; THIRD PARTIES; TRAINING DATA;

EID: 77952339517     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2010.105     Document Type: Conference Paper
Times cited : (24)

References (30)
  • 3
    • 0027699087 scopus 로고
    • Lattice-based access control models
    • Nov.
    • R. Sandhu, "Lattice-based access control models," Computer, vol. 26, Nov. 1993, pp. 9-19.
    • (1993) Computer , vol.26 , pp. 9-19
    • Sandhu, R.1
  • 4
    • 17644425267 scopus 로고    scopus 로고
    • FTC cracks down on spyware and PC hijacking, but not true lies
    • R. Stern, "FTC cracks down on spyware and PC hijacking, but not true lies," Micro, vol. 25, 2005, pp. 100-101.
    • (2005) Micro , vol.25 , pp. 100-101
    • Stern, R.1
  • 6
    • 77952348016 scopus 로고    scopus 로고
    • [accessed 2009-05-18]
    • Spyware, us-cert.gov/reading-room/Spywarehome-0905.pdf [accessed 2009-05-18].
  • 7
    • 12844250664 scopus 로고    scopus 로고
    • Software in the year 2010
    • T. Bollinger, "Software in the year 2010," IT Professional, vol. 6, 2004, pp. 11-15.
    • (2004) IT Professional , vol.6 , pp. 11-15
    • Bollinger, T.1
  • 8
    • 23344444212 scopus 로고    scopus 로고
    • Is spyware an internet nuisance or public menace?
    • H. Qing and T. Dinev, "Is spyware an internet nuisance or public menace?" Communications of the ACM, vol. 48, 2005, pp. 61-66.
    • (2005) Communications of the ACM , vol.48 , pp. 61-66
    • Qing, H.1    Dinev, T.2
  • 9
    • 9144256106 scopus 로고    scopus 로고
    • Understanding spyware: Risk and response
    • W. Ames, "Understanding spyware: Risk and response," IT Professional, vol. 6, 2004, pp. 25-29
    • (2004) IT Professional , vol.6 , pp. 25-29
    • Ames, W.1
  • 10
    • 84878718185 scopus 로고    scopus 로고
    • Application of data mining based malicious code detection techniques for detecting new spyware
    • Bilkent University
    • C. D. Bozagac, "Application of Data Mining based Malicious Code Detection Techniques for Detecting new Spyware", White paper, Bilkent University, 2005.
    • (2005) White Paper
    • Bozagac, C.D.1
  • 12
    • 0034838197 scopus 로고    scopus 로고
    • Data mining methods for detection of new malicious executables
    • 14-16 May Los Alamitos, CA, USA: IEEE Computer Society
    • M. Schultz, E. Eskin, F. Zadok, and S. Stolfo, "Data mining methods for detection of new malicious executables," Proceedings of IEEE Symposium on Security and Privacy, 14-16 May 2001, Los Alamitos, CA, USA: IEEE Computer Society, pp. 38-49.
    • (2001) Proceedings of IEEE Symposium on Security and Privacy , pp. 38-49
    • Schultz, M.1    Eskin, E.2    Zadok, F.3    Stolfo, S.4
  • 13
    • 77952371330 scopus 로고    scopus 로고
    • Press Release [accessed 2009-05-14]
    • Zone Alarm, Press Release 2000, http://www.zonealarm.com [accessed 2009-05-14].
    • (2000)
  • 15
    • 85149612939 scopus 로고
    • Fast effective rule induction
    • San Francisco, CA: Morgan Kaufmann Publishers
    • W. Cohen, "Fast effective rule induction," Proc. 12th International Conference on Machine Learning, pp. 115-23, San Francisco, CA: Morgan Kaufmann Publishers, 1995.
    • (1995) Proc. 12th International Conference on Machine Learning , pp. 115-123
    • Cohen, W.1
  • 16
    • 34748865971 scopus 로고    scopus 로고
    • A feature selection and evaluation scheme for computer virus detection
    • 18-22 Dec., Piscataway, NJ, USA: IEEE
    • O. Henchiri and N. Japkowicz, "A feature selection and evaluation scheme for computer virus detection," 6th International Conference on Data Mining (ICDM'06), 18-22 Dec., Piscataway, NJ, USA: IEEE, pp. 918-922.
    • 6th International Conference on Data Mining (ICDM'06) , pp. 918-922
    • Henchiri, O.1    Japkowicz, N.2
  • 25
    • 57749204679 scopus 로고    scopus 로고
    • New malicious code detection using variable length n-grams
    • D. Reddy, S. Dash, and A. Pujari, "New Malicious Code Detection Using Variable Length n-grams," Information Systems Security, 2006, pp. 276-288.
    • (2006) Information Systems Security , pp. 276-288
    • Reddy, D.1    Dash, S.2    Pujari, A.3
  • 26
    • 50349090268 scopus 로고    scopus 로고
    • Cross-validation and bootstrapping are unreliable in small sample classification
    • Oct.
    • Isaksson, M. Wallman, H. Göransson, and M. Gustafsson, "Cross-validation and bootstrapping are unreliable in small sample classification," Pattern Recognition Letters, vol. 29, Oct. 2008, pp. 1960-1965.
    • (2008) Pattern Recognition Letters , vol.29 , pp. 1960-1965
    • Isaksson, M.1    Göransson, W.H.2    Gustafsson, M.3
  • 27
    • 77952332912 scopus 로고    scopus 로고
    • [accessed 2009-05-17]
    • Download, http://download.com [accessed 2009-05-17].
  • 28
    • 77952417484 scopus 로고    scopus 로고
    • [accessed 2009-04-23]
    • Spyware Guide, http://Spywareguide.com [accessed 2009-04-23].
  • 29
    • 77952417905 scopus 로고    scopus 로고
    • [accessed 2009-04-26]
    • Linux/Unix Command: xxd, http://linux.about.com/library/cmd/blcmdl1-xxd. htm [accessed 2009-04-26].
    • Linux/Unix Command: Xxd
  • 30


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.