메뉴 건너뛰기




Volumn 85, Issue 7, 2012, Pages 1650-1672

Malware characteristics and threats on the internet ecosystem

Author keywords

Malware characteristics and categorization; Malware propagation mechanisms and payloads; Self organizing maps; Support vector machines

Indexed keywords

CLASSIFICATION FRAMEWORK; COMPACT CODE; FEATURE SPACE; GENERALIZATION CAPABILITY; INFORMATION GAIN; LEARNING MODELS; MALWARE PROPAGATION; MALWARES; PENETRATION RATES; PROPAGATION CHANNELS; SECURITY THREATS; SPECIES CLASSIFICATION; TOKENIZATION; TROJANS; WORD-STEMMING; ZERO DAY ATTACK;

EID: 84861096936     PISSN: 01641212     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jss.2012.02.015     Document Type: Article
Times cited : (45)

References (56)
  • 1
    • 24044435942 scopus 로고    scopus 로고
    • Reducing multiclass to binary: A unifying approach for margin classifiers
    • Allwein E.L.; Schapire R.E.; Singer Y.; and Kaelbling P. Reducing multiclass to binary: a unifying approach for margin classifiers Journal of Machine Learning Research 1 2000 113 141 (Pubitemid 33738778)
    • (2001) Journal of Machine Learning Research , vol.1 , Issue.2 , pp. 113-141
    • Allwein, E.L.1    Schapire, R.E.2    Singer, Y.3
  • 3
    • 84861098789 scopus 로고    scopus 로고
    • June Technical Report. Department of Computer Science, School of Engineering and Applied Science, Washington DC
    • Boney, D.G.; 1999, June. The Plague: An Army of Software Agents for Information Warfare. Technical Report. Department of Computer Science, School of Engineering and Applied Science, Washington DC.
    • (1999) The Plague: An Army of Software Agents for Information Warfare
    • Boney, D.G.1
  • 7
    • 33746911072 scopus 로고    scopus 로고
    • From antivirus to antimalware software and beyond: Another approach to the protection of customers from dysfunctional system behaviour
    • Arlington, VA, USA, October NIST
    • Brunnstein K. From antivirus to antimalware software and beyond: another approach to the protection of customers from dysfunctional system behaviour Proceedings of the 22nd National Information System Security Conference Arlington, VA, USA, October 1999 NIST 1 14
    • (1999) Proceedings of the 22nd National Information System Security Conference , pp. 1-14
    • Brunnstein, K.1
  • 9
    • 0000913324 scopus 로고    scopus 로고
    • SVMTorch: Support Vector Machines for large-scale regression problems
    • Collobert R.; and Bengio S. SVMtorch: support vector machines for large-scale regression problems Journal of Machine Learning Research (JMLR) 1 2001 143 160 (Pubitemid 33738779)
    • (2001) Journal of Machine Learning Research , vol.1 , Issue.2 , pp. 143-160
    • Collobert, R.1    Bengio, S.2
  • 10
    • 33845391802 scopus 로고    scopus 로고
    • Vigilante: End-to-end containment of Internet worms
    • DOI 10.1145/1095809.1095824
    • Costa M.; Crowcroft J.; Castro M.; Rowstron A.; Zhou L.; Zhang L.; and Barham P. Vigilante: end-to-end containment of internet worms Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP2005) Brighton, United Kingdom, October 2005 ACM New York, NY, USA 133 147 (Pubitemid 44892209)
    • (2005) Operating Systems Review (ACM) , vol.39 , Issue.5 , pp. 133-147
    • Costa, M.1    Crowcroft, J.2    Castro, M.3    Rowstron, A.4    Zhou, L.5    Zhang, L.6    Barham, P.7
  • 11
    • 77954566293 scopus 로고    scopus 로고
    • Detection and analysis of drive-by-download attacks and malicious Javascript code
    • Raleigh, NC, USA, April ACM
    • Cova M.; Kruegel C.; and Vigna G. Detection and analysis of drive-by-download attacks and malicious Javascript code Proceedings of the World Wide Web Conference Raleigh, NC, USA, April 2010 ACM 1 10
    • (2010) Proceedings of the World Wide Web Conference , pp. 1-10
    • Cova, M.1    Kruegel, C.2    Vigna, G.3
  • 12
    • 0010442827 scopus 로고    scopus 로고
    • On the algorithmic implementation of multiclass kernel-based vector machines
    • DECEMBER
    • Crammer K.; and Singer Y. On the algorithmic implementation of multiclass kernel-based vector machines Journal of Machine Learning Research 2 December 2001 265 292
    • (2001) Journal of Machine Learning Research , vol.2 , pp. 265-292
    • Crammer, K.1    Singer, Y.2
  • 14
    • 0000406788 scopus 로고
    • Solving multiclass learning problems via error-correcting output codes
    • JANUARY
    • Dietterich T.G.; and Bakiri G. Solving multiclass learning problems via error-correcting output codes Journal of Artificial Intelligence Research 2 January 1995 263 286
    • (1995) Journal of Artificial Intelligence Research , vol.2 , pp. 263-286
    • Dietterich, T.G.1    Bakiri, G.2
  • 15
    • 0041657519 scopus 로고    scopus 로고
    • Interior-point methods for massive support vector machines
    • DOI 10.1137/S1052623400374379, PII S1052623400374379
    • Ferris M.; and Munson T. Interior-point methods for massive support vector machines SIAM Journal of Optimization 13 3 2003 783 804 (Pubitemid 36971112)
    • (2003) SIAM Journal on Optimization , vol.13 , Issue.3 , pp. 783-804
    • Ferris, M.C.1    Munson, T.S.2
  • 16
    • 2942731012 scopus 로고    scopus 로고
    • An extensive empirical study of feature selection metrics for text classification
    • Forman G. An extensive empirical study of feature selection metrics for text classification Journal of Machine Learning Research 3 2003 1289 1305
    • (2003) Journal of Machine Learning Research , vol.3 , pp. 1289-1305
    • Forman, G.1
  • 19
    • 0035470889 scopus 로고    scopus 로고
    • Greedy function approximation: A gradient boosting machine
    • Friedman J.H. Greedy function approximation: a gradient boosting machine Annals of Statistics 29 1999 1189 1232 (Pubitemid 33405972)
    • (2001) Annals of Statistics , vol.29 , Issue.5 , pp. 1189-1232
    • Friedman, J.H.1
  • 20
    • 0032355984 scopus 로고    scopus 로고
    • Classification by pairwise coupling
    • Hastie T.; and Tibshirani R. Classification by pairwise coupling The Annals of Statistics 26 2 1998 451 471
    • (1998) The Annals of Statistics , vol.26 , Issue.2 , pp. 451-471
    • Hastie, T.1    Tibshirani, R.2
  • 21
    • 84861096611 scopus 로고    scopus 로고
    • A system to support the analysis of antivirus products' virus detection capabilities
    • ISBN 951-44-5370-0
    • Helenius M. A system to support the analysis of antivirus products' virus detection capabilities Tampereen Yliopisto 2002 ISBN 951-44-5370-0
    • (2002) Tampereen Yliopisto
    • Helenius, M.1
  • 23
    • 0002714543 scopus 로고    scopus 로고
    • Making large-scale support vector machine learning practical
    • Schoelkopf B. Burges C. Smola A. MIT Press Cambridge, MA (Chapter 11)
    • Joachims T. Making large-scale support vector machine learning practical Schoelkopf B. Burges C. Smola A. Advances in Kernel Methods - Support Vector Learning 1999 MIT Press Cambridge, MA 169 184 (Chapter 11)
    • (1999) Advances in Kernel Methods - Support Vector Learning , pp. 169-184
    • Joachims, T.1
  • 25
    • 21844461582 scopus 로고    scopus 로고
    • A modified finite newton method for fast solution of large scale linear SVMs
    • Keerthi S.; and DeCoste D. A modified finite newton method for fast solution of large scale linear SVMs Journal of Machine Learning Research (JMLR) 6 2005 341 361
    • (2005) Journal of Machine Learning Research (JMLR) , vol.6 , pp. 341-361
    • Keerthi, S.1    Decoste, D.2
  • 30
    • 38149001240 scopus 로고    scopus 로고
    • Behavioral classification
    • Hamburg, Germany, April/May European Expert Group for IT Security
    • Lee T.; and Mody J. Behavioral classification Proceedings of the EICAR Conference Hamburg, Germany, April/May 2006 European Expert Group for IT Security 1 17
    • (2006) Proceedings of the EICAR Conference , pp. 1-17
    • Lee, T.1    Mody, J.2
  • 31
    • 0012879285 scopus 로고    scopus 로고
    • Technical Report. Department of Computer Engineering, Chalmers University of Technology, Goteborg, Sweden
    • Lindqvist, U, 1999. On the Fundamentals of Analysis and Detection of Computer Misuse. Technical Report. Department of Computer Engineering, Chalmers University of Technology, Goteborg, Sweden.
    • (1999) On the Fundamentals of Analysis and Detection of Computer Misuse
    • Lindqvist, U.1
  • 32
    • 0030676601 scopus 로고    scopus 로고
    • How to systematically classify computer security intrusions
    • Oakland, CA, November IEEE Computer Society Press
    • Lindqvist U.; and Jonsson E. How to systematically classify computer security intrusions Proceedings of the 1997 IEEE Symposium on Security & Privacy Oakland, CA, November 1997 IEEE Computer Society Press 154 163
    • (1997) Proceedings of the 1997 IEEE Symposium on Security & Privacy , pp. 154-163
    • Lindqvist, U.1    Jonsson, E.2
  • 37
    • 84948481845 scopus 로고
    • An algorithm for suffix stripping
    • Porter M.F. An algorithm for suffix stripping Program 14 3 1980 130 137
    • (1980) Program , vol.14 , Issue.3 , pp. 130-137
    • Porter, M.F.1
  • 39
    • 45549117987 scopus 로고
    • Term-weighting approaches in automatic text retrieval
    • Salton G.; and Buckley C. Term-weighting approaches in automatic text retrieval Information Processing and Management 24 5 1988 513 523
    • (1988) Information Processing and Management , vol.24 , Issue.5 , pp. 513-523
    • Salton, G.1    Buckley, C.2
  • 43
    • 30344459996 scopus 로고    scopus 로고
    • Countering network worms through automatic patch generation
    • DOI 10.1109/MSP.2005.144
    • Sidiroglou S.; and Keromytis A.D. Countering network worms through automatic patch generation Security & Privacy 3 November-December (6) 2005 41 49 (Pubitemid 43060393)
    • (2005) IEEE Security and Privacy , vol.3 , Issue.6 , pp. 41-49
    • Sidiroglou, S.1    Keromytis, A.D.2
  • 50
  • 54
    • 34047110218 scopus 로고    scopus 로고
    • Toward automated dynamic malware analysis using CWSandbox
    • DOI 10.1109/MSP.2007.45
    • Willems C.; Holz T.; and Freiling F. CWSandbox: towards automated dynamic binary analysis Security and Privacy 5 March-April (2) 2007 32 39 (Pubitemid 46527386)
    • (2007) IEEE Security and Privacy , vol.5 , Issue.2 , pp. 32-39
    • Willems, G.1    Holz, T.2    Freiling, F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.