메뉴 건너뛰기




Volumn , Issue , 2011, Pages 131-142

Polonium: Tera-scale graph mining and inference for malware detection

Author keywords

[No Author keywords available]

Indexed keywords

MALWARE; POLONIUM; QUERY PROCESSING;

EID: 80052678930     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1137/1.9781611972818.12     Document Type: Conference Paper
Times cited : (141)

References (33)
  • 1
    • 69249090883 scopus 로고    scopus 로고
    • April
    • Symantec. (2008, April) Symantec internet security threat report. [Online]. Available: http://eval.symantec.com/mktginfo/enterprise/white-papers/ b-whitepaper-internet-security-threat-report-xiii-04-2008.en-us.pdf
    • (2008) Symantec Internet Security Threat Report
  • 4
    • 84880095176 scopus 로고    scopus 로고
    • Symantec. Malware definition. [Online]. Available: www.symantec.com/ norton/security-response/malware.jsp
    • Malware Definition
  • 5
    • 56549084673 scopus 로고    scopus 로고
    • A survey of malware detection techniques
    • Department of Computer Science
    • N. Idika and A. P. Mathur, "A Survey of Malware Detection Techniques," Department of Computer Science, Purdue University, Tech. Rep., 2007.
    • (2007) Purdue University, Tech. Rep.
    • Idika, N.1    Mathur, A.P.2
  • 6
    • 73049094155 scopus 로고    scopus 로고
    • A survey of data mining techniques for malware detection using file features
    • New York, NY, USA: ACM
    • M. Siddiqui, M. C. Wang, and J. Lee, "A survey of data mining techniques for malware detection using file features," in ACMSE '08. New York, NY, USA: ACM, 2008, pp. 509-510.
    • (2008) ACMSE '08 , pp. 509-510
    • Siddiqui, M.1    Wang, M.C.2    Lee, J.3
  • 8
    • 0034838197 scopus 로고    scopus 로고
    • Data mining methods for detection of new malicious executables
    • IEEE COMPUTER SOCIETY
    • M. Schultz, E. Eskin, E. Zadok, and S. Stolfo, "Data mining methods for detection of new malicious executables," in IEEE Symposium on Security and Privacy. IEEE COMPUTER SOCIETY, 2001, pp. 38-49.
    • (2001) IEEE Symposium on Security and Privacy , pp. 38-49
    • Schultz, M.1    Eskin, E.2    Zadok, E.3    Stolfo, S.4
  • 9
    • 0030216542 scopus 로고    scopus 로고
    • Neural networks for computer virus recognition
    • G. Tesauro, J. Kephart, and G. Sorkin, "Neural networks for computer virus recognition," IEEE expert, vol. 11, no. 4, pp. 5-6, 1996.
    • (1996) IEEE Expert , vol.11 , Issue.4 , pp. 5-6
    • Tesauro, G.1    Kephart, J.2    Sorkin, G.3
  • 10
    • 33845768389 scopus 로고    scopus 로고
    • Learning to detect and classify malicious executables in the wild
    • J. Kolter and M. Maloof, "Learning to detect and classify malicious executables in the wild," The Journal of Machine Learning Research, vol. 7, p. 2744, 2006.
    • (2006) The Journal of Machine Learning Research , vol.7 , pp. 2744
    • Kolter, J.1    Maloof, M.2
  • 11
    • 0038589165 scopus 로고    scopus 로고
    • The anatomy of a large-scale hypertextual web search engine
    • S. Brin and L. Page, "The anatomy of a large-scale hypertextual Web search engine," Computer networks and ISDN systems, vol. 30, no. 1-7, pp. 107-117, 1998.
    • (1998) Computer Networks and isDN Systems , vol.30 , Issue.1 , pp. 107-117
    • Brin, S.1    Page, L.2
  • 12
    • 4243148480 scopus 로고    scopus 로고
    • Authoritative sources in a hyperlinked environment
    • J. Kleinberg, "Authoritative sources in a hyperlinked environment," Journal of the ACM (JACM), vol. 46, no. 5, pp. 604-632, 1999.
    • (1999) Journal of the ACM (JACM) , vol.46 , Issue.5 , pp. 604-632
    • Kleinberg, J.1
  • 19
    • 35348860262 scopus 로고    scopus 로고
    • Netprobe: A fast and scalable system for fraud detection in online auction networks
    • New York, NY, USA: ACM
    • S. Pandit, D. H. Chau, S. Wang, and C. Faloutsos, "Netprobe: a fast and scalable system for fraud detection in online auction networks," in WWW '07. New York, NY, USA: ACM, 2007, pp. 201-210.
    • (2007) WWW '07 , pp. 201-210
    • Pandit, S.1    Chau, D.H.2    Wang, S.3    Faloutsos, C.4
  • 20
    • 70350647577 scopus 로고    scopus 로고
    • SNARE: A link analytic system for graph labeling and risk detection
    • ACM New York, NY, USA
    • M. McGlohon, S. Bay, M. Anderle, D. Steier, and C. Faloutsos, "SNARE: a link analytic system for graph labeling and risk detection," in SIGKDD '09. ACM New York, NY, USA, 2009, pp. 1265-1274.
    • (2009) SIGKDD '09 , pp. 1265-1274
    • McGlohon, M.1    Bay, S.2    Anderle, M.3    Steier, D.4    Faloutsos, C.5
  • 22
    • 27944440695 scopus 로고    scopus 로고
    • Modeling the structure and effectiveness of intelligence organizations: Dynamic information flow simulation
    • R. Behrman and K. Carley, "Modeling the structure and effectiveness of intelligence organizations: Dynamic information flow simulation." in Proceedings of the 8th International Command and Control Research and Technology Symposium., 2003. [Online]. Available: http://www.casos.cs.cmu.edu/ publications/papers/behrman-2003-modelingstructure.pdf
    • (2003) Proceedings of the 8th International Command and Control Research and Technology Symposium
    • Behrman, R.1    Carley, K.2
  • 23
    • 33947235341 scopus 로고    scopus 로고
    • Suspicion scoring based on guilt-by-association, collective inference, and focused data access
    • June
    • S. A. Macskassy and F. Provost, "Suspicion scoring based on guilt-by-association, collective inference, and focused data access." in Proceedings of the NAACSOS Conference, June 2005.
    • (2005) Proceedings of the NAACSOS Conference
    • Macskassy, S.A.1    Provost, F.2
  • 24
    • 78149333073 scopus 로고    scopus 로고
    • Gspan: Graph-based substructure pattern mining
    • Washington, DC, USA: IEEE Computer Society
    • X. Yan and J. Han, "gspan: Graph-based substructure pattern mining," in ICDM '02. Washington, DC, USA: IEEE Computer Society, 2002, p. 721.
    • (2002) ICDM '02 , pp. 721
    • Yan, X.1    Han, J.2
  • 25
    • 29844432494 scopus 로고    scopus 로고
    • Graphminer: A structural pattern-mining system for large disk-based graph databases and its applications
    • ACM
    • W. Wang, C. Wang, Y. Zhu, B. Shi, J. Pei, X. Yan, and J. Han, "Graphminer: a structural pattern-mining system for large disk-based graph databases and its applications," in SIGMOD '05. ACM, 2005, p. 881.
    • (2005) SIGMOD '05 , pp. 881
    • Wang, W.1    Wang, C.2    Zhu, Y.3    Shi, B.4    Pei, J.5    Yan, X.6    Han, J.7
  • 26
    • 32344444324 scopus 로고    scopus 로고
    • On mining cross-graph quasi-cliques
    • ACM
    • J. Pei, D. Jiang, and A. Zhang, "On mining cross-graph quasi-cliques," in SIGKDD '05. ACM, 2005, p. 238.
    • (2005) SIGKDD '05 , pp. 238
    • Pei, J.1    Jiang, D.2    Zhang, A.3
  • 27
    • 32344434822 scopus 로고    scopus 로고
    • Mining closed relational graphs with connectivity constraints
    • ACM
    • X. Yan, X. Zhou, and J. Han, "Mining closed relational graphs with connectivity constraints," in SIGKDD '05. ACM, 2005, p. 333.
    • (2005) SIGKDD '05 , pp. 333
    • Yan, X.1    Zhou, X.2    Han, J.3
  • 28
    • 33749560883 scopus 로고    scopus 로고
    • Coherent closed quasi-clique discovery from large dense graph databases
    • ACM
    • Z. Zeng, J. Wang, L. Zhou, and G. Karypis, "Coherent closed quasi-clique discovery from large dense graph databases," in SIGKDD '06. ACM, 2006, p. 802.
    • (2006) SIGKDD '06 , pp. 802
    • Zeng, Z.1    Wang, J.2    Zhou, L.3    Karypis, G.4
  • 30
    • 80052395632 scopus 로고    scopus 로고
    • Residual splash for optimally parallelizing belief propagation
    • J. Gonzalez, Y. Low, and C. Guestrin, "Residual splash for optimally parallelizing belief propagation." AISTATS, 2009.
    • (2009) AISTATS
    • Gonzalez, J.1    Low, Y.2    Guestrin, C.3
  • 31
    • 77951152705 scopus 로고    scopus 로고
    • PEGASUS: A peta-scale graph mining system
    • IEEE
    • U. Kang, C. Tsourakakis, and C. Faloutsos, "PEGASUS: A Peta-Scale Graph Mining System," in ICDM '09. IEEE, 2009, pp. 229-238.
    • (2009) ICDM '09 , pp. 229-238
    • Kang, U.1    Tsourakakis, C.2    Faloutsos, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.