메뉴 건너뛰기




Volumn 23, Issue 3, 2012, Pages 154-162

A graph mining approach for detecting unknown malwares

Author keywords

API; CFG; Detection; Malware; PE file; Unknown malwares

Indexed keywords


EID: 84859034694     PISSN: 1045926X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jvlc.2012.02.002     Document Type: Article
Times cited : (62)

References (39)
  • 2
    • 84860834767 scopus 로고
    • Induction of one-level decision trees, in: Proceedings of the Ninth International Conference on Machine Learning, Citeseer
    • W. Ai, P. Langley, Induction of one-level decision trees, in: Proceedings of the Ninth International Conference on Machine Learning, Citeseer, 1992.
    • (1992)
    • Ai, W.1    Langley, P.2
  • 3
    • 84860839311 scopus 로고    scopus 로고
    • Automated Analysis of Computer Viruses
    • W. Arnold, G. Sorkin, Automated Analysis of Computer Viruses, 1996.
    • (1996)
    • Arnold, W.1    Sorkin, G.2
  • 4
    • 84860833874 scopus 로고    scopus 로고
    • Static analysis of binary code to isolate malicious behaviors, in: IEEE Eighth International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises. (WET ICE'99) Proceedings, IEEE
    • J. Bergeron, M. Debbabi, M. Erhioui, B. Ktari, Static analysis of binary code to isolate malicious behaviors, in: IEEE Eighth International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises. (WET ICE'99) Proceedings, IEEE, 1999, pp. 184-189.
    • (1999) , pp. 184-189
    • Bergeron, J.1    Debbabi, M.2    Erhioui, M.3    Ktari, B.4
  • 7
    • 0035478854 scopus 로고    scopus 로고
    • Random forests
    • Breiman L. Random forests. Machine Learning 2001, 45(1):5-32.
    • (2001) Machine Learning , vol.45 , Issue.1 , pp. 5-32
    • Breiman, L.1
  • 9
    • 77954329802 scopus 로고    scopus 로고
    • A fast flowgraph based classification system for packed and polymorphic malware on the endhost, in: 24th IEEE International Conference on Advanced Information Networking and Applications (AINA), IEEE
    • S. Cesare, Y. Xiang, A fast flowgraph based classification system for packed and polymorphic malware on the endhost, in: 24th IEEE International Conference on Advanced Information Networking and Applications (AINA), IEEE, 2010, pp. 721-728.
    • (2010) , pp. 721-728
    • Cesare, S.1    Xiang, Y.2
  • 10
    • 70449427488 scopus 로고    scopus 로고
    • Dynamic detection of unknown malicious executables base on api interception, in: First International Workshop on Database Technology and Applications, IEEE
    • F. Chen, Y. Fu, Dynamic detection of unknown malicious executables base on api interception, in: First International Workshop on Database Technology and Applications, IEEE, 2009, pp. 329-332.
    • (2009) , pp. 329-332
    • Chen, F.1    Fu, Y.2
  • 11
    • 85129530187 scopus 로고
    • K: an instance-based learner using an entropic distance measure
    • in: International Workshop then Conference on Machine Learning, Morgan Kaufmann Publishers, Inc.
    • J. Cleary, L. Trigg, K*: an instance-based learner using an entropic distance measure, in: International Workshop then Conference on Machine Learning, Morgan Kaufmann Publishers, Inc., 1995, pp. 108-114.
    • (1995) , pp. 108-114
    • Cleary, J.1    Trigg, L.2
  • 12
    • 77952602657 scopus 로고    scopus 로고
    • Efficient virus detection using dynamic instruction sequences
    • Dai J., Guha R., Lee J. Efficient virus detection using dynamic instruction sequences. Journal of Computers 2009, 4(5):405-414.
    • (2009) Journal of Computers , vol.4 , Issue.5 , pp. 405-414
    • Dai, J.1    Guha, R.2    Lee, J.3
  • 13
    • 0034250160 scopus 로고    scopus 로고
    • An experimental comparison of three methods for constructing ensembles of decision trees: bagging, boosting, and randomization
    • Dietterich T. An experimental comparison of three methods for constructing ensembles of decision trees: bagging, boosting, and randomization. Machine Learning 2000, 40(2):139-157.
    • (2000) Machine Learning , vol.40 , Issue.2 , pp. 139-157
    • Dietterich, T.1
  • 14
    • 0041833610 scopus 로고    scopus 로고
    • Partial auc estimation and regression
    • Dodd L., Pepe M. Partial auc estimation and regression. Biometrics 2003, 59(3):614-623.
    • (2003) Biometrics , vol.59 , Issue.3 , pp. 614-623
    • Dodd, L.1    Pepe, M.2
  • 16
    • 57049171932 scopus 로고    scopus 로고
    • Binhunt: automatically finding semantic differences in binary programs
    • Gao D., Reiter M., Song D. Binhunt: automatically finding semantic differences in binary programs. Information and Communications Security 2008, 238-255.
    • (2008) Information and Communications Security , pp. 238-255
    • Gao, D.1    Reiter, M.2    Song, D.3
  • 17
    • 66049094737 scopus 로고    scopus 로고
    • Making Sense of Anti-malware Comparative Testing
    • Harley D. Making Sense of Anti-malware Comparative Testing. Information Security Technical Report 2009, 14(1):7-15.
    • (2009) Information Security Technical Report , vol.14 , Issue.1 , pp. 7-15
    • Harley, D.1
  • 19
    • 49749108277 scopus 로고    scopus 로고
    • Code graph for malware detection, in: International Conference on Information Networking. ICOIN 2008, IEEE
    • K. Jeong, H. Lee, Code graph for malware detection, in: International Conference on Information Networking. ICOIN 2008, IEEE, 2008, pp. 1-5.
    • (2008) , pp. 1-5
    • Jeong, K.1    Lee, H.2
  • 20
    • 0003552088 scopus 로고
    • Automatic extraction of computer virus signatures, in: Fourth Virus Bulletin International Conference
    • J. Kephart, W. Arnold, Automatic extraction of computer virus signatures, in: Fourth Virus Bulletin International Conference, 1994, pp. 178-184.
    • (1994) , pp. 178-184
    • Kephart, J.1    Arnold, W.2
  • 21
    • 17644421307 scopus 로고    scopus 로고
    • Recent worms: a survey and trends
    • in: Proceedings of the 2003 ACM workshop on Rapid Malcode, ACM
    • D. Kienzle, M. Elder, Recent worms: a survey and trends, in: Proceedings of the 2003 ACM workshop on Rapid Malcode, ACM, 2003, pp. 1-10.
    • (2003) , pp. 1-10
    • Kienzle, D.1    Elder, M.2
  • 22
    • 0001409330 scopus 로고    scopus 로고
    • Naive (Bayes) at forty: the independence assumption in information retrieval
    • Lewis D. Naive (Bayes) at forty: the independence assumption in information retrieval. Machine Learning: ECML 1998, 98:4-15.
    • (1998) Machine Learning: ECML , vol.98 , pp. 4-15
    • Lewis, D.1
  • 23
    • 48649087530 scopus 로고    scopus 로고
    • Limits of static analysis for malware detection, in: Twenty-Third Annual Computer Security Applications Conference, ACSAC 2007, IEEE
    • A. Moser, C. Kruegel, E. Kirda, Limits of static analysis for malware detection, in: Twenty-Third Annual Computer Security Applications Conference, ACSAC 2007, IEEE, 2007, pp. 421-430.
    • (2007) , pp. 421-430
    • Moser, A.1    Kruegel, C.2    Kirda, E.3
  • 24
    • 0030685617 scopus 로고    scopus 로고
    • Proof-carrying code, in: Proceedings of the 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, ACM
    • G. Necula, Proof-carrying code, in: Proceedings of the 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, ACM, 1997, pp. 106-119.
    • (1997) , pp. 106-119
    • Necula, G.1
  • 25
    • 0033295259 scopus 로고    scopus 로고
    • Bro: a system for detecting network intruders in real-time
    • Paxson V. Bro: a system for detecting network intruders in real-time. Computer Networks 1999, 31(23-24):2435-2463.
    • (1999) Computer Networks , vol.31 , Issue.23-24 , pp. 2435-2463
    • Paxson, V.1
  • 27
    • 84860841144 scopus 로고    scopus 로고
    • Fast Training of Support Vector Machines Using Sequential Minimal Optimization
    • J. Platt, Fast Training of Support Vector Machines Using Sequential Minimal Optimization, 1998.
    • (1998)
    • Platt, J.1
  • 28
    • 57749204679 scopus 로고    scopus 로고
    • New malicious code detection using variable length n-grams
    • Reddy D., Dash S., Pujari A. New malicious code detection using variable length n-grams. Information Systems Security 2006, 276-288.
    • (2006) Information Systems Security , pp. 276-288
    • Reddy, D.1    Dash, S.2    Pujari, A.3
  • 29
    • 33751168025 scopus 로고    scopus 로고
    • N-Gram analysis for computer virus detection
    • Reddy D., Pujari A. n-Gram analysis for computer virus detection. Journal in Computer Virology 2006, 2(3):231-239.
    • (2006) Journal in Computer Virology , vol.2 , Issue.3 , pp. 231-239
    • Reddy, D.1    Pujari, A.2
  • 30
    • 70349869466 scopus 로고    scopus 로고
    • Signature generation and detection of malware families, in: Information Security and Privacy, Springer
    • V. Sathyanarayan, P. Kohli, B. Bruhadeshwar, Signature generation and detection of malware families, in: Information Security and Privacy, Springer, 2008, pp. 336-349.
    • (2008) , pp. 336-349
    • Sathyanarayan, V.1    Kohli, P.2    Bruhadeshwar, B.3
  • 31
    • 65749099969 scopus 로고    scopus 로고
    • Detection of malicious code by applying machine learning classifiers on static features: a state-of-the-art survey
    • Shabtai A., Moskovitch R., Elovici Y., Glezer C. Detection of malicious code by applying machine learning classifiers on static features: a state-of-the-art survey. Information Security Technical Report 2009, 14(1):16-29.
    • (2009) Information Security Technical Report , vol.14 , Issue.1 , pp. 16-29
    • Shabtai, A.1    Moskovitch, R.2    Elovici, Y.3    Glezer, C.4
  • 32
  • 33
    • 84860834766 scopus 로고    scopus 로고
    • Hunting for metamorphic, in: Virus Bulletin Conference
    • P. Ször, P. Ferrie, Hunting for metamorphic, in: Virus Bulletin Conference, 2001.
    • (2001)
    • Ször, P.1    Ferrie, P.2
  • 34
    • 0030216542 scopus 로고    scopus 로고
    • Neural networks for computer virus recognition
    • Tesauro G., Kephart J., Sorkin G. Neural networks for computer virus recognition. IEEE Expert 1996, 11(4):5-6.
    • (1996) IEEE Expert , vol.11 , Issue.4 , pp. 5-6
    • Tesauro, G.1    Kephart, J.2    Sorkin, G.3
  • 35
    • 84860839309 scopus 로고    scopus 로고
    • 〈〉.
    • P.-E. Tool, 2011. 〈〉. http://www.pe-explorer.com/peexplorer-tour-disassembler.htm.
    • (2011)
    • Tool, P.-E.1
  • 36
    • 84860841141 scopus 로고    scopus 로고
    • A Comprehensive Survey on Malware and Malware Detection Techniques, CS 854-Hot Topics in Computer and Communications Security Project Report
    • T. Tran, K. Alsubhi, A Comprehensive Survey on Malware and Malware Detection Techniques, CS 854-Hot Topics in Computer and Communications Security Project Report, 2006.
    • (2006)
    • Tran, T.1    Alsubhi, K.2
  • 37
    • 70350666613 scopus 로고    scopus 로고
    • Static cfg analyzer for metamorphic malware code, in: Proceedings of the Second International Conference on Security of Information and Networks, ACM
    • P. Vinod, V. Laxmi, M. Gaur, G. Kumar, Y. Chundawat, Static cfg analyzer for metamorphic malware code, in: Proceedings of the Second International Conference on Security of Information and Networks, ACM, 2009, pp. 225-228.
    • (2009) , pp. 225-228
    • Vinod, P.1    Laxmi, V.2    Gaur, M.3    Kumar, G.4    Chundawat, Y.5
  • 38
    • 28344446955 scopus 로고    scopus 로고
    • Polymorphic malicious executable scanner by api sequence analysis, in: Fourth International Conference on Hybrid Intelligent Systems. HIS'04, IEEE
    • J. Xu, A. Sung, P. Chavez, S. Mukkamala, Polymorphic malicious executable scanner by api sequence analysis, in: Fourth International Conference on Hybrid Intelligent Systems. HIS'04, IEEE, 2004, pp. 378-383.
    • (2004) , pp. 378-383
    • Xu, J.1    Sung, A.2    Chavez, P.3    Mukkamala, S.4
  • 39
    • 54849412646 scopus 로고    scopus 로고
    • An intelligent pe-malware detection system based on association mining
    • Ye Y., Wang D., Li T., Ye D., Jiang Q. An intelligent pe-malware detection system based on association mining. Journal in Computer Virology 2008, 4(4):323-334.
    • (2008) Journal in Computer Virology , vol.4 , Issue.4 , pp. 323-334
    • Ye, Y.1    Wang, D.2    Li, T.3    Ye, D.4    Jiang, Q.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.