메뉴 건너뛰기




Volumn 2, Issue 3, 2011, Pages

Cloud-based malware detection for evolving data streams

Author keywords

Data mining; Data streams; Malicious executable; Malware detection; N gram analysis

Indexed keywords

CLASSIFICATION ERRORS; COMPUTING ARCHITECTURE; DATA CHUNKS; DATA STREAM; EMPIRICAL EVIDENCE; ENSEMBLE CLASSIFIERS; ENSEMBLE TECHNIQUES; FEATURE EXTRACTION AND SELECTION; FEATURE EXTRACTION TECHNIQUES; FEATURE SETS; MALICIOUS EXECUTABLE; MALICIOUS EXECUTABLES; MALWARE DETECTION; MAP-REDUCE; MULTI-PASS; N-GRAM ANALYSIS; STREAM CLASSIFICATION; SYNTHETIC DATA; TEXT STREAMS;

EID: 84860563303     PISSN: 2158656X     EISSN: 21586578     Source Type: Journal    
DOI: 10.1145/2019618.2019622     Document Type: Article
Times cited : (63)

References (41)
  • 1
    • 33645657061 scopus 로고    scopus 로고
    • A framework for on-demand classification of evolving data streams
    • Aggarwal C. C. Han J.,Wang J. And Yu P. S. 2006. A Framework For On-Demand Classification Of Evolving Data Streams. Ieee Trans. Knowl. Data Engin. 18, 5, 577-589.
    • (2006) Ieee Trans. Knowl. Data Engin. , vol.18 , Issue.5 , pp. 577-589
    • Aggarwal, C.C.1    Han J.Wang, J.2    Yu, P.S.3
  • 2
    • 0025725905 scopus 로고
    • Instance-based learning algorithms
    • DOI 10.1023/A:1022689900470
    • Aha D. W. Kibler D. And Albert M. K. 1991. Instance-Based Learning Algorithms. Mach. Learn. 6, 37-66. (Pubitemid 21727227)
    • (1991) Machine Learning , vol.6 , Issue.1 , pp. 37-66
    • Aha David, W.1    Kibler Dennis2    Albert Marc, K.3
  • 3
    • 84860596307 scopus 로고    scopus 로고
    • Apache. Hadoop. Hadoop.Apache.Org
    • Apache. 2010. Hadoop. Hadoop.Apache.Org.
    • (2010)
  • 4
    • 84882582017 scopus 로고    scopus 로고
    • An inside look at botnets
    • M. Christodorescu S. Jha D. Maughan D. Song And C. Wang Eds. Springer
    • Barford P. And Yegneswaran V. 2006. An Inside Look At Botnets. In Malware Detection Advances In Information Security M. Christodorescu S. Jha D. Maughan D. Song And C. Wang Eds. Springer, 171-192.
    • (2006) Malware Detection Advances In Information Security , pp. 171-192
    • Barford, P.1    Yegneswaran, V.2
  • 10
    • 33745788387 scopus 로고    scopus 로고
    • On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
    • DOI 10.1145/1102120.1102152, CCS 2005 - Proceedings of the 12th ACM Conference on Computer and Communications Security
    • Crandall J. R. Su Z.,Wu S. F. And Chong F. T. 2005. On Deriving Unknown Vulnerabilities From Zero-Day Polymorphic And Metamorphic Worm Exploits. In Proceedings Of The 12Th Acm Conference On Computer And Communications Security (Ccs'05). 235-248. (Pubitemid 44022007)
    • (2005) Proceedings of the ACM Conference on Computer and Communications Security , pp. 235-248
    • Crandall, J.R.1    Su, Z.2    Wu, S.F.3    Chong, F.T.4
  • 11
    • 37549003336 scopus 로고    scopus 로고
    • Mapreduce: Simplified data processing on large clusters
    • Dean J. And Ghemawat S. 2008. Mapreduce: Simplified Data Processing On Large Clusters. Comm. Acm 51, 1, 107-113.
    • (2008) Comm. Acm , vol.51 , Issue.1 , pp. 107-113
    • Dean, J.1    Ghemawat, S.2
  • 23
    • 84860554986 scopus 로고    scopus 로고
    • Bot software looks to improve peerage
    • Lemos R. 2006. Bot Software Looks To Improve Peerage. Securityfocus. Www.Securityfocus.Com/News/11390.
    • (2006) Securityfocus.
    • Lemos, R.1
  • 27
    • 39749143915 scopus 로고    scopus 로고
    • A scalable multi-level feature extraction technique to detect malicious executables
    • DOI 10.1007/s10796-007-9054-3
    • Masud M. M.,Khan L. And Thuraisingham. B. 2008B. A Scalable Multi-Level Feature Extraction Technique To Detect Malicious Executables. Inf. Syst. Frontiers 10, 1, 33-45. (Pubitemid 351303936)
    • (2008) Information Systems Frontiers , vol.10 , Issue.1 , pp. 33-45
    • Masud, M.M.1    Khan, L.2    Thuraisingham, B.3
  • 29
    • 27544498978 scopus 로고    scopus 로고
    • Polygraph: Automatically generating signatures for polymorphic worms
    • Proceedings - 2005 IEEE Symposium on Security and Privacy, IEEE S and P 2005
    • Newsome J. Karp B. And Song D. 2005. Polygraph: Automatically Generating Signatures For Polymorphic Worms. In Proceedings Of The Ieee Symposium On Security And Privacy (S&P). 226-241. (Pubitemid 41543658)
    • (2005) Proceedings - IEEE Symposium on Security and Privacy , pp. 226-241
    • Newsome, J.1    Karp, B.2    Song, D.3
  • 36
    • 0030365938 scopus 로고    scopus 로고
    • Error correlation and error reduction in ensemble classifiers
    • Tumer K. And Ghosh J. 1996. Error Correlation And Error Reduction In Ensemble Classifiers. Connect. Sci. 8, 3, 385-404.
    • (1996) Connect. Sci. , vol.8 , Issue.3 , pp. 385-404
    • Tumer, K.1    Ghosh, J.2
  • 37
    • 84860596309 scopus 로고    scopus 로고
    • Vx Heavens 2010.Vx Heavens. Vx.Netlux.Org
    • Vx Heavens 2010. Vx Heavens. Vx.Netlux.Org.
  • 39
    • 32344442287 scopus 로고    scopus 로고
    • Combining proactive and reactive predictions for data streams
    • DOI 10.1145/1081870.1081961, KDD-2005 - Proceedings of the 11th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
    • Yang Y. Wu X. And Zhu X. 2005. Combining Proactive And Reactive Predictions For Data Streams. In Proceedings Of The 11Th Acm International Conference On Knowledge Discovery And Datamining (Kdd). 710-715. (Pubitemid 43218344)
    • (2005) Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining , pp. 710-715
    • Yang, Y.1    Wu, X.2    Zhu, X.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.