메뉴 건너뛰기




Volumn 39, Issue 2, 2010, Pages 57-72

Using multi-feature and classifier ensembles to improve malware detection

Author keywords

Classifier ensembles; Features; Machine learning; Malware

Indexed keywords

ANTI VIRUS; BEHAVIOR-BASED; CLASSIFIER ENSEMBLES; COMBINED FEATURES; CONTENT-BASED; EXECUTABLES; FEATURES; INDIVIDUAL CLASSIFIERS; INTERNET APPLICATION; MACHINE-LEARNING; MALWARE DETECTION; MALWARES; RAPID GROWTH; SIGNATURE-MATCHING;

EID: 83755220464     PISSN: 02556030     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (39)

References (49)
  • 2
    • 18144374544 scopus 로고    scopus 로고
    • Classification methods in the detection of new malicious emails
    • DOI 10.1016/j.ins.2004.06.003, PII S002002550400180X
    • Shih, D. H., Chiang, H. S., and Yen, C. D., "Classification Methods in the Detection of New Malicious Emails," Information Sciences, Vol. 172, Issue 1-2, pp. 241-261, 2005. (Pubitemid 40612875)
    • (2005) Information Sciences , vol.172 , Issue.1-2 , pp. 241-261
    • Shih, D.-H.1    Chiang, H.-S.2    Yen, C.D.3
  • 3
    • 33845768389 scopus 로고    scopus 로고
    • Learning to detect and classify malicious executables in the wild
    • Kolter, J. Z. and Maloof, M. A., "Learning to Detect and Classify Malicious Executables in the Wild," Journal of Machine Learning Research, Vol. 7, pp. 2721-2744, 2006. (Pubitemid 46011490)
    • (2006) Journal of Machine Learning Research , vol.7 , pp. 2721-2744
    • Zico Kolter, J.1    Maloof, M.A.2
  • 5
    • 42749086128 scopus 로고    scopus 로고
    • Detection of unknown computer worms based on behavioral classification of the host
    • Moskovitch, R., Elovici, Y., and Rokach, L., "Detection of Unknown Computer Worms Based on Behavioral Classification of the Host," Computational Statistics and Data Analysis, Vol. 52, Issue 9, pp. 4544-4566, 2008.
    • (2008) Computational Statistics and Data Analysis , vol.52 , Issue.9 , pp. 4544-4566
    • Moskovitch, R.1    Elovici, Y.2    Rokach, L.3
  • 11
    • 54849412646 scopus 로고    scopus 로고
    • An intelligent PE-malware detection system based on association mining
    • Ye, Y. F., Wang, D. D., Li, T., and Ye, D. Y., "An Intelligent PE-malware Detection System Based on Association Mining," Journal in Computer Virology, Vol. 4, No.4, pp. 323-334, 2008.
    • (2008) Journal in Computer Virology , vol.4 , Issue.4 , pp. 323-334
    • Ye, Y.F.1    Wang, D.D.2    Li, T.3    Ye, D.Y.4
  • 13
    • 38549122470 scopus 로고    scopus 로고
    • A hybrid model to detect malicious executables
    • DOI 10.1109/ICC.2007.242, 4288913, 2007 IEEE International Conference on Communications, ICC'07
    • Masud, M. M., Khan, L., and Thuraisingham, B., "A Hybrid Model to Detect Malicious Executables," Proc. of the IEEE International Conference on Communications, Glasgow, UK, pp. 1443-1448, 2007. (Pubitemid 351145738)
    • (2007) IEEE International Conference on Communications , pp. 1443-1448
    • Masud, M.M.1    Khan, L.2    Thuraisingham, B.3
  • 14
    • 39749143915 scopus 로고    scopus 로고
    • A scalable multi-level feature extraction technique to detect malicious executables
    • DOI 10.1007/s10796-007-9054-3
    • Masud, M. M., Khan, L., and Thuraisingham, B., "A Scalable Multi-level Feature Extraction Technique to Detect Malicious Executables," Information Systems Frontiers, Vol. 10, No. 1, pp. 33-45, 2008. (Pubitemid 351303936)
    • (2008) Information Systems Frontiers , vol.10 , Issue.1 , pp. 33-45
    • Masud, M.M.1    Khan, L.2    Thuraisingham, B.3
  • 15
    • 57749204679 scopus 로고    scopus 로고
    • New malicious code detection using variable length n-grams
    • Reddy, K.S., Dash, S.K., and Pujari, A.K., "New Malicious Code Detection Using Variable Length n-grams," Lecture Notes in Computer Science, Vol. 4332, pp. 276-288, 2006.
    • (2006) Lecture Notes in Computer Science , vol.4332 , pp. 276-288
    • Reddy, K.S.1    Dash, S.K.2    Pujari, A.K.3
  • 16
    • 70350621370 scopus 로고    scopus 로고
    • SBMDS: An interpretable string based malware detection system using SVM ensemble with bagging
    • Ye, Y.Y., Chen, L.F., Wang, D.D., Li, T., Jiang, Q.S., and Zhao, M., "SBMDS: An interpretable string based malware detection system using SVM ensemble with bagging," Journal in Computer Virology, Vol. 5, No.4, pp. 283-293, 2009.
    • (2009) Journal in Computer Virology , vol.5 , Issue.4 , pp. 283-293
    • Ye, Y.Y.1    Chen, L.F.2    Wang, D.D.3    Li, T.4    Jiang, Q.S.5    Zhao, M.6
  • 17
    • 76649143365 scopus 로고    scopus 로고
    • PE-Miner: Mining structural information to detect malicious executables in realtime
    • Shafiq, M.Z., Tabish, S.M., Mirza, F., and Farooq, M., "PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime," Lecture Notes in Computer Science, Vol. 5758, pp. 121-141, 2009.
    • (2009) Lecture Notes in Computer Science , vol.5758 , pp. 121-141
    • Shafiq, M.Z.1    Tabish, S.M.2    Mirza, F.3    Farooq, M.4
  • 19
    • 57649195950 scopus 로고    scopus 로고
    • A novel approach to malicious executables detection and containment based on distributed system architecture
    • Jinan, China
    • Liu, Z. and Zhang, X. S., "A Novel Approach to Malicious Executables Detection and Containment Based on Distributed System Architecture," Proc. of the 4th International Conference on Natural Computation, Jinan, China, pp. 160-164, 2008.
    • (2008) Proc. of the 4th International Conference on Natural Computation , pp. 160-164
    • Liu, Z.1    Zhang, X.S.2
  • 23
    • 26944502079 scopus 로고    scopus 로고
    • Unknown computer virus detection based on K-nearest neighbor algorithm
    • Zhang, B. Y., Yin, J., Zhang, D., Hao, J., "Unknown Computer Virus Detection Based on K-Nearest Neighbor Algorithm," Computer Engineering and Applications, Vol. 6, pp. 7-10, 2005.
    • (2005) Computer Engineering and Applications , vol.6 , pp. 7-10
    • Zhang, B.Y.1    Yin, J.2    Zhang, D.3    Hao, J.4
  • 24
    • 70350179568 scopus 로고    scopus 로고
    • Improving worm detection with artificial neural networks through feature selection and temporal analysis techniques
    • Stopel, D., Boger, Z., Moskovitch, R., Shahar, Y., and Elovici, Y., "Improving Worm Detection with Artificial Neural Networks through Feature Selection and Temporal Analysis Techniques," Transactions on Engineering, Computing and Technology, Vol. 15, pp. 202-208, 2006.
    • (2006) Transactions on Engineering, Computing and Technology , vol.15 , pp. 202-208
    • Stopel, D.1    Boger, Z.2    Moskovitch, R.3    Shahar, Y.4    Elovici, Y.5
  • 27
    • 0000551189 scopus 로고    scopus 로고
    • Popular ensemble methods: An empirical study
    • Opitz, D. and Maclin, R., "Popular Ensemble Methods: A Empirical Study," Journal of Artificial Intelligence Research, Vol. 11, pp. 169-198, 1999. (Pubitemid 129628763)
    • (1999) Journal of Artificial Intelligence Research , vol.11 , pp. 169-198
    • Opitz, D.1    Maclin, R.2
  • 29
    • 84958554285 scopus 로고    scopus 로고
    • An evaluation of grading classifiers
    • Advances in Intelligent Data Analysis
    • Seewald, A. K. and Furnkranz, J., "An Evaluation of Grading Classifiers," Proc. of 4th International Symposium on Intelligent Data Analysis, Lisbon, Portugal, pp. 115-124, 2001. (Pubitemid 33348491)
    • (2001) Lecture Notes in Computer Science , Issue.2189 , pp. 115-124
    • Seewald, A.K.1    Furnkranz, J.2
  • 32
    • 70349503911 scopus 로고    scopus 로고
    • Metamorphic virus: Analysis and detection
    • Royal Holloway University of London
    • Konstantinou, E. and Wolthusen S., "Metamorphic Virus: Analysis and Detection," Technical Report RHUL-MA-2008-02, Royal Holloway University of London, 2008.
    • (2008) Technical Report RHUL-MA-2008-02
    • Konstantinou, E.1    Wolthusen, S.2
  • 33
    • 84855320425 scopus 로고    scopus 로고
    • DARPA Datasets
    • DARPA Datasets, http://www.ll.mit.edu/ mission/Communications/ist/ corporal/ideval/data/ index.html
  • 34
    • 84855320424 scopus 로고    scopus 로고
    • PEView
    • PEView, http://hs.hosp.ncku.edu.tw/cww/html/download.html
  • 35
    • 84855334539 scopus 로고    scopus 로고
    • VMWare
    • VMWare, http://www.vmware.com
  • 36
    • 84855320423 scopus 로고    scopus 로고
    • PEiD
    • PEiD, http://www.softpedia.com/ progDownload/PEiD-updated-Download-4102. html
  • 37
    • 84855298820 scopus 로고    scopus 로고
    • AutoRuns
    • AutoRuns, http://technet.microsoft.com /en-us/sysinternals/bb963902.aspx
  • 38
    • 84855314042 scopus 로고    scopus 로고
    • ProcessExplorer
    • ProcessExplorer, http://tec om/en-us/ sysinternals/bb896653.asp
  • 39
    • 84855320427 scopus 로고    scopus 로고
    • FileMon
    • FileMon,http://technet.micros/sysinternals/bb896642.aspx
  • 40
    • 84855320429 scopus 로고    scopus 로고
    • Rootkitrevealer
    • Rootkitrevealer, http://technet. om/en-us/sysinter
  • 41
    • 84855320428 scopus 로고    scopus 로고
    • IceSword
    • IceSword,http://antirootkit.com/software/IceSword.htm
  • 42
    • 84855298822 scopus 로고    scopus 로고
    • Fport
    • Fport, http://www.foundstone.com/us/ resources/ prod
  • 47
    • 0001882616 scopus 로고
    • Fast algorithms for mining association a for support vector machines rules
    • Santiago, Chile
    • Agrawal, R. and Srikant, R., " Fast Algorithms for Mining Association a for Support Vector Machines, " Rules, " Proc. of the 20th Very Large Databases Conference, Santiago, Chile, pp. 487-499, 1994.
    • (1994) Proc. of the 20th Very Large Databases Conference , pp. 487-499
    • Agrawal, R.1    Srikant, R.2
  • 48
    • 84855334540 scopus 로고    scopus 로고
    • WEKA
    • WEKA,http://www.cs.waikato.ac.nz/ml/weka/.
  • 49
    • 84855314045 scopus 로고    scopus 로고
    • LIBSVM: Library Software, available at
    • Chang, C. C. and Lin, C. J., " LIBSVM: Library Software available at http://www.csie.ntu.edu.tw/~cjlin/libsvm/ index.html
    • Chang, C.C.1    Lin, C.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.