메뉴 건너뛰기




Volumn 30, Issue 6-7, 2011, Pages 514-524

Feature representation and selection in malicious code detection methods based on static system calls

Author keywords

Malicious code; N gram; Security; Static detection; System call

Indexed keywords

MALICIOUS CODES; N-GRAM; SECURITY; STATIC DETECTION; SYSTEM CALLS;

EID: 80051781512     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2011.05.007     Document Type: Article
Times cited : (45)

References (26)
  • 4
    • 27544465088 scopus 로고    scopus 로고
    • Anomaly intrusion detection for system call using the soundex algorithm and neural networks
    • Proceedings - 10th IEEE Symposium on Computers and Communications, ISCC 2005
    • Cha BR, Vaidya B, Han S. Anomaly intrusion detection for system call using the Soundex algorithm and neural networks. In: 10th IEEE symposium on computer and communications, Cartagena, Murcia, Spain; June 2005. p. 427-433. (Pubitemid 41543309)
    • (2005) Proceedings - IEEE Symposium on Computers and Communications , pp. 427-433
    • Cha, B.1    Vaidya, B.2    Han, S.3
  • 8
    • 80051792443 scopus 로고    scopus 로고
    • (accessed 23.03.10)
    • S.A. Hex-Rays IDA pro introduction 2009 Available from: http://www.hex-rays.com/products.shtml/ (accessed 23.03.10)
    • (2009) IDA Pro Introduction
    • Hex-Rays, S.A.1
  • 10
    • 24944517527 scopus 로고    scopus 로고
    • Learning classifiers for misuse detection using a bag of system calls representation
    • Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2005. Proceedings
    • Kang DK, Fuller D, Honavar V. Learning classifiers for Misuse and anomaly detection using a Bag of system calls representation. In: Workshop on information assurance and security United States military academy, West Point, NY; June 2005. p. 511-516. (Pubitemid 41314466)
    • (2005) Lecture Notes in Computer Science , vol.3495 , pp. 511-516
    • Kang, D.-K.1    Fuller, D.2    Honavar, V.3
  • 11
    • 33845768389 scopus 로고    scopus 로고
    • Learning to detect and classify malicious executables in the wild
    • J.Z. Kolter, and M.A. Maloof Learning to detect and classify malicious executables in the wild Journal of Machine Learning Research 7 2006 2721 2744 (Pubitemid 46011490)
    • (2006) Journal of Machine Learning Research , vol.7 , pp. 2721-2744
    • Zico Kolter, J.1    Maloof, M.A.2
  • 14
    • 80051780701 scopus 로고    scopus 로고
    • netlux.org (accessed 23.03.10)
    • netlux.org Malicious code samples 2009 Available from: http://vx.netlux.org/ (accessed 23.03.10)
    • (2009) Malicious Code Samples
  • 15
    • 84902268375 scopus 로고    scopus 로고
    • (accessed 23.03.10)
    • Offensive Computing Malicious code samples 2005 Available from: http://www.offensivecomputing.net/ (accessed 23.03.10)
    • (2005) Malicious Code Samples
    • Computing, O.1
  • 16
    • 84888868663 scopus 로고    scopus 로고
    • Peid (accessed 23.3.10)
    • Peid Peid v0.94 Available From: 2007 http://www.peid.info/ (accessed 23.3.10)
    • (2007) Peid v0.94
  • 18
    • 33751168025 scopus 로고    scopus 로고
    • N-gram analysis for computer virus detection
    • DOI 10.1007/s11416-006-0027-8
    • D.K.S. Reddy, and A.K. Pujari N-gram analysis for new computer virus detection Journal in Computer Virology 2 3 2006 231 239 (Pubitemid 44777788)
    • (2006) Journal in Computer Virology , vol.2 , Issue.3 , pp. 231-239
    • Reddy, D.K.S.1    Pujari, A.K.2
  • 23
    • 54849412646 scopus 로고    scopus 로고
    • An intelligent PE-Malware detection system based on association mining
    • Y.F. Ye, D.D. Wang, and T. Li An intelligent PE-Malware detection system based on association mining Journal in Computer Virology 4 4 2008 323 334
    • (2008) Journal in Computer Virology , vol.4 , Issue.4 , pp. 323-334
    • Ye, Y.F.1    Wang, D.D.2    Li, T.3
  • 24
    • 0037209446 scopus 로고    scopus 로고
    • Host-based intrusion detection using dynamic and static behavioral models
    • D.Y. Yeung, and Y. Ding Host-based intrusion detection using dynamic and static behavioral models Pattern Recognition 36 1 2003 229 243
    • (2003) Pattern Recognition , vol.36 , Issue.1 , pp. 229-243
    • Yeung, D.Y.1    Ding, Y.2
  • 25
    • 56549097799 scopus 로고    scopus 로고
    • High-order Markov kernels for intrusion detection
    • C. Yin, S. Tian, and S. Mu High-order Markov kernels for intrusion detection Neurocomputing 71 2008 3247 3252
    • (2008) Neurocomputing , vol.71 , pp. 3247-3252
    • Yin, C.1    Tian, S.2    Mu, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.