메뉴 건너뛰기




Volumn 121, Issue , 2010, Pages 171-182

Zero-day malware detection based on supervised learning algorithms of API call signatures

Author keywords

API; Intrusion detection; Malware; Obfuscation

Indexed keywords

API; API CALLS; AUTOMATED DATA MINING; AUTOMATED TOOLS; BACK PROPAGATION NEURAL NETWORKS; CODE OBFUSCATION; DATA MINING ALGORITHM; DATA MINING FRAMEWORKS; DATA MINING TECHNIQUES; EXPERIMENTAL ANALYSIS; EXPERIMENTAL INVESTIGATIONS; FALSE POSITIVE; K NEAREST NEIGHBOR ALGORITHM; LARGE DATASETS; MALWARE DETECTION; MALWARES; NOVEL TECHNIQUES; OBFUSCATION; RADIAL BASIS FUNCTIONS; SEQUENTIAL MINIMAL OPTIMIZATION ALGORITHMS; TRUE POSITIVE RATES;

EID: 84870509534     PISSN: 14451336     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Article
Times cited : (111)

References (39)
  • 1
    • 84870573498 scopus 로고    scopus 로고
    • Static Analysis of Obfuscated Malware
    • Ballarat
    • Alazab, M 2010, 'Static Analysis of Obfuscated Malware', in Annual Research Conference, Ballarat, p. 17.
    • (2010) Annual Research Conference , pp. 17
    • Alazab, M.1
  • 6
    • 33746406796 scopus 로고    scopus 로고
    • Detecting Self-mutating Malware Using Control-Flow Graph Matching
    • R Büschkes & P Laskov (eds), Springer Berlin / Heidelberg
    • Bruschi, D, Martignoni, L & Monga, M 2006, 'Detecting Self-mutating Malware Using Control-Flow Graph Matching', in R Büschkes & P Laskov (eds), Detection of Intrusions and Malware & Vulnerability Assessment, Springer Berlin / Heidelberg, vol. 4064, pp. 129-43.
    • (2006) Detection of Intrusions and Malware & Vulnerability Assessment , vol.4064 , pp. 129-143
    • Bruschi, D.1    Martignoni, L.2    Monga, M.3
  • 7
    • 3042769950 scopus 로고    scopus 로고
    • Protecting Software Code by Guards
    • T Sander (ed.), Springer Berlin / Heidelberg
    • Chang, H & Atallah, M 2002, 'Protecting Software Code by Guards', in T Sander (ed.), Security and Privacy in Digital Rights Management, Springer Berlin / Heidelberg, vol. 2320, pp. 125-41.
    • (2002) Security and Privacy in Digital Rights Management , vol.2320 , pp. 125-141
    • Chang, H.1    Atallah, M.2
  • 8
    • 63149135419 scopus 로고    scopus 로고
    • A static API birthmark for Windows binary executables
    • Choi, S, Park, H, Lim, H-i & Han, T 2009, 'A static API birthmark for Windows binary executables', Journal of Systems and Software, vol. 82, no. 5, pp. 862-73.
    • (2009) Journal of Systems and Software , vol.82 , Issue.5 , pp. 862-873
    • Choi, S.1    Park, H.2    Lim, H.-I.3    Han, T.4
  • 10
    • 0002169158 scopus 로고
    • Knowledge discovery in databases: An overview
    • Frawley, W, Piatetsky-shapiro, G & Matheus, C 1992, 'Knowledge discovery in databases: An overview', Al Magazine, vol. 13, no. 3, pp. 213-28.
    • (1992) Al Magazine , vol.13 , Issue.3 , pp. 213-228
    • Frawley, W.1    Piatetsky-shapiro, G.2    Matheus, C.3
  • 12
    • 33845768389 scopus 로고    scopus 로고
    • Learning to Detect and Classify Malicious Executables in the Wild
    • Kolter, JZ & Maloof, MA 2006, 'Learning to Detect and Classify Malicious Executables in the Wild', J. Mach. Learn. Res., vol. 7, pp. 2721-44.
    • (2006) J. Mach. Learn. Res. , vol.7 , pp. 2721-2744
    • Kolter, J.Z.1    Maloof, M.A.2
  • 13
    • 33644870376 scopus 로고    scopus 로고
    • On the optimality of NaIve Bayes with dependent binary features
    • Kuncheva, LI 2006, 'On the optimality of NaIve Bayes with dependent binary features', Pattern Recognition Letters, vol. 27, no. 7, pp. 830-7.
    • (2006) Pattern Recognition Letters , vol.27 , Issue.7 , pp. 830-837
    • Kuncheva, L.I.1
  • 14
    • 14344262813 scopus 로고    scopus 로고
    • Obfuscation of executable code to improve resistance to static disassembly
    • Washington, DC, USA
    • Linn, C & Debray, S 2003, 'Obfuscation of executable code to improve resistance to static disassembly', in 10th ACM conference on Computer and communications security Washington, DC, USA, pp. 290-9.
    • (2003) 10th ACM conference on Computer and communications security , pp. 290-299
    • Linn, C.1    Debray, S.2
  • 16
    • 84870553412 scopus 로고    scopus 로고
    • MetaPHOR Symantec Enterprise Security
    • MetaPHOR 2010, W32.Simile, Symantec Enterprise Security,.
    • (2010) W32.Simile
  • 18
    • 58149092690 scopus 로고    scopus 로고
    • Detecting Java Theft Based on Static API Trace Birthmark
    • K Matsuura & E Fujisaki (eds), Springer Berlin / Heidelberg
    • Park, H, Choi, S, Lim, H-I & Han, T 2008b, 'Detecting Java Theft Based on Static API Trace Birthmark', in K Matsuura & E Fujisaki (eds), Advances in Information and Computer Security, Springer Berlin / Heidelberg, vol. 5312, pp. 121-35.
    • (2008) Advances in Information and Computer Security , vol.5312 , pp. 121-135
    • Park, H.1    Choi, S.2    Lim, H.-I.3    Han, T.4
  • 21
    • 84869593046 scopus 로고    scopus 로고
    • The Current State of Cybercrime and What to Expect in 2011
    • RSA
    • RSA 2011, 'The Current State of Cybercrime and What to Expect in 2011', RSA 2011 cybercrime trends report
    • (2011) RSA 2011 cybercrime trends report
  • 24
    • 57049186367 scopus 로고    scopus 로고
    • Eureka: A Framework for Enabling Static Malware Analysis
    • S Jajodia & J Lopez (eds), Springer Berlin / Heidelberg
    • Sharif, M, Yegneswaran, V, Saidi, H, Porras, P & Lee, W 2008, 'Eureka: A Framework for Enabling Static Malware Analysis', in S Jajodia & J Lopez (eds), Computer Security - ESORICS 2008, Springer Berlin / Heidelberg, vol. 5283, pp. 481-500.
    • (2008) Computer Security -ESORICS 2008 , vol.5283 , pp. 481-500
    • Sharif, M.1    Yegneswaran, V.2    Saidi, H.3    Porras, P.4    Lee, W.5
  • 27
    • 84870533751 scopus 로고    scopus 로고
    • Understanding Heuristics: Symantecs Bloodhound Technolog
    • Symantec Enterprise Security
    • Symantec Enterprise Security 1997, 'Understanding Heuristics: Symantec's Bloodhound Technolog', Virus Bulletin, vol. XXXIV.
    • (1997) Virus Bulletin , pp. 34
  • 28
    • 84870479583 scopus 로고    scopus 로고
    • Symantec Global Internet Security Threat Report Trends for 2008
    • Symantec Enterprise Security
    • Symantec Enterprise Security 2009, 'Symantec Global Internet Security Threat Report Trends for 2008', Symantec Enterprise Security, vol. XIV.
    • (2009) Symantec Enterprise Security , pp. 14
  • 29
    • 84870531593 scopus 로고    scopus 로고
    • Symantec Internet Security Threat Report: Trends for 2009
    • Symantec Enterprise Security
    • Symantec Enterprise Security 2010, 'Symantec Internet Security Threat Report: Trends for 2009', Symantec Enterprise Security, vol. XV.
    • (2010) Symantec Enterprise Security , pp. 15
  • 30
    • 77954950954 scopus 로고    scopus 로고
    • Symantec Internet Security Threat Report: Trends for 2010
    • Symantec Enterprise Security
    • Symantec Enterprise Security 2011, 'Symantec Internet Security Threat Report: Trends for 2010', Symantec Enterprise Security, vol. 16.
    • (2011) Symantec Enterprise Security , vol.16
  • 32
    • 84867314000 scopus 로고    scopus 로고
    • An Enhanced Automated Signature Generation Algorithm for Polymorphic Malware Detection
    • Tang, K, Zhou, M-T & Zuo, Z-H 2010, 'An Enhanced Automated Signature Generation Algorithm for Polymorphic Malware Detection', Journal of Electronic Science and Technology, vol. 8, no. 2, pp. 114-21.
    • (2010) Journal of Electronic Science and Technology , vol.8 , Issue.2 , pp. 114-121
    • Tang, K.1    Zhou, M.-T.2    Zuo, Z.-H.3
  • 33
    • 78649813950 scopus 로고    scopus 로고
    • Autonomic Context-Dependent Architecture for Malware Detection
    • Singapore
    • Venkatraman, S 2009, 'Autonomic Context-Dependent Architecture for Malware Detection', in e-Tech 2009, International Conference on e-Technology, Singapore, pp. 2927-47.
    • (2009) e-Tech 2009, International Conference on e-Technology , pp. 2927-2947
    • Venkatraman, S.1
  • 39
    • 36849096063 scopus 로고    scopus 로고
    • paper presented to Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining, San Jose, California, USA
    • Ye, Y, Wang, D, Li, T & Ye, D 2007, 'IMDS: intelligent malware detection system', paper presented to Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining, San Jose, California, USA
    • (2007) IMDS: intelligent malware detection system
    • Ye, Y.1    Wang, D.2    Li, T.3    Ye, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.