메뉴 건너뛰기




Volumn 231, Issue , 2013, Pages 64-82

Opcode sequences as representation of executables for data-mining-based unknown malware detection

Author keywords

Computer security; Data mining; Machine learning; Malware detection; Supervised learning

Indexed keywords

ANTI VIRUS; EMPIRICAL VALIDATION; EXECUTABLES; GLOBAL SECURITY; MALICIOUS CODES; MALWARE DETECTION; MALWARE FAMILIES; MALWARES; OP-CODE SEQUENCE; OR-NETWORKS;

EID: 84874105145     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2011.08.020     Document Type: Article
Times cited : (383)

References (85)
  • 1
    • 0032786569 scopus 로고    scopus 로고
    • Improving support vector machine classifiers by modifying kernel functions
    • S. Amari, and S. Wu Improving support vector machine classifiers by modifying kernel functions Neural Networks 12 1999 783 789
    • (1999) Neural Networks , vol.12 , pp. 783-789
    • Amari, S.1    Wu, S.2
  • 2
    • 0001185873 scopus 로고
    • An essay towards solving a problem in the doctrine of chances
    • T. Bayes An essay towards solving a problem in the doctrine of chances Philosophical Transactions of the Royal Society 53 1763 370 418
    • (1763) Philosophical Transactions of the Royal Society , vol.53 , pp. 370-418
    • Bayes, T.1
  • 6
    • 0031334221 scopus 로고    scopus 로고
    • Selection of relevant features and examples in machine learning
    • A. Blum, and P. Langley Selection of relevant features and examples in machine learning Artificial Intelligence 97 1997 245 271
    • (1997) Artificial Intelligence , vol.97 , pp. 245-271
    • Blum, A.1    Langley, P.2
  • 10
    • 33644641221 scopus 로고    scopus 로고
    • On the combination of evolutionary algorithms and stratified strategies for training set selection in data mining
    • J. Cano, F. Herrera, and M. Lozano On the combination of evolutionary algorithms and stratified strategies for training set selection in data mining Applied Soft Computing Journal 6 2006 323 332
    • (2006) Applied Soft Computing Journal , vol.6 , pp. 323-332
    • Cano, J.1    Herrera, F.2    Lozano, M.3
  • 20
    • 0242302657 scopus 로고    scopus 로고
    • Consistency-based search in feature selection
    • M. Dash, and H. Liu Consistency-based search in feature selection Artificial Intelligence 151 2003 155 176
    • (2003) Artificial Intelligence , vol.151 , pp. 155-176
    • Dash, M.1    Liu, H.2
  • 23
    • 77950036364 scopus 로고    scopus 로고
    • On the versatility of radial basis function neural networks: A case study in the field of intrusion detection
    • D. Fisch, A. Hofmann, and B. Sick On the versatility of radial basis function neural networks: a case study in the field of intrusion detection Information Sciences 180 2010 2421 2439
    • (2010) Information Sciences , vol.180 , pp. 2421-2439
    • Fisch, D.1    Hofmann, A.2    Sick, B.3
  • 27
    • 84874112702 scopus 로고    scopus 로고
    • Shielding wireless sensor network using markovian intrusion detection system with attack pattern mining
    • J. Huang, and I. Liao Shielding wireless sensor network using markovian intrusion detection system with attack pattern mining Information Sciences 2011
    • (2011) Information Sciences
    • Huang, J.1    Liao, I.2
  • 28
    • 56549084673 scopus 로고    scopus 로고
    • A survey of malware detection techniques
    • Department of Computer Science, Purdue University
    • N. Idika, A. Mathur, A survey of malware detection techniques, Technical Report, Department of Computer Science, Purdue University, 2007.
    • (2007) Technical Report
    • Idika, N.1    Mathur, A.2
  • 29
    • 48349134267 scopus 로고    scopus 로고
    • Behavioral detection of malware: From a survey towards an established taxonomy
    • G. Jacob, H. Debar, and E. Filiol Behavioral detection of malware: from a survey towards an established taxonomy Journal in Computer Virology 4 2008 251 266
    • (2008) Journal in Computer Virology , vol.4 , pp. 251-266
    • Jacob, G.1    Debar, H.2    Filiol, E.3
  • 30
    • 33745771538 scopus 로고    scopus 로고
    • Machine learning techniques and chi-square feature selection for cancer classification using SAGE gene expression profiles
    • X. Jin, A. Xu, R. Bie, and P. Guo Machine learning techniques and chi-square feature selection for cancer classification using SAGE gene expression profiles Lecture Notes in Computer Science 3916 2006 106 115
    • (2006) Lecture Notes in Computer Science , vol.3916 , pp. 106-115
    • Jin, X.1    Xu, A.2    Bie, R.3    Guo, P.4
  • 34
    • 0001600762 scopus 로고
    • Information gain and a general measure of correlation
    • J. Kent Information gain and a general measure of correlation Biometrika 70 1983 163
    • (1983) Biometrika , vol.70 , pp. 163
    • Kent, J.1
  • 39
    • 56949107719 scopus 로고    scopus 로고
    • Multiple criteria mathematical programming for multi-class classification and application in network intrusion detection
    • G. Kou, Y. Peng, Z. Chen, and Y. Shi Multiple criteria mathematical programming for multi-class classification and application in network intrusion detection Information Sciences 179 2009 371 381
    • (2009) Information Sciences , vol.179 , pp. 371-381
    • Kou, G.1    Peng, Y.2    Chen, Z.3    Shi, Y.4
  • 41
    • 84957069091 scopus 로고    scopus 로고
    • Naive (Bayes) at forty: The independence assumption in information retrieval
    • D. Lewis Naive (Bayes) at forty: the independence assumption in information retrieval Lecture Notes in Computer Science 1398 1998 4 18
    • (1998) Lecture Notes in Computer Science , vol.1398 , pp. 4-18
    • Lewis, D.1
  • 46
    • 0025798330 scopus 로고
    • A distance-based attribute selection measure for decision tree induction
    • R. Mántaras A distance-based attribute selection measure for decision tree induction Machine Learning 6 1991 81 92
    • (1991) Machine Learning , vol.6 , pp. 81-92
    • Mántaras, R.1
  • 51
    • 52149092178 scopus 로고    scopus 로고
    • The evolution of commercial malware development kits and colour-by-numbers custom malware
    • G. Ollmann The evolution of commercial malware development kits and colour-by-numbers custom malware Computer Fraud and Security 2008 2008 4 7
    • (2008) Computer Fraud and Security , vol.2008 , pp. 4-7
    • Ollmann, G.1
  • 53
    • 24344458137 scopus 로고    scopus 로고
    • Feature selection based on mutual information: Criteria of max-dependency, max-relevance, and min-redundancy
    • H. Peng, F. Long, and C. Ding Feature selection based on mutual information: criteria of max-dependency, max-relevance, and min-redundancy IEEE Transactions on Pattern Analysis and Machine Intelligence 2005 1226 1238
    • (2005) IEEE Transactions on Pattern Analysis and Machine Intelligence , pp. 1226-1238
    • Peng, H.1    Long, F.2    Ding, C.3
  • 54
    • 50149118846 scopus 로고    scopus 로고
    • Classification of packed executables for accurate computer virus detection
    • R. Perdisci, A. Lanzi, and W. Lee Classification of packed executables for accurate computer virus detection Pattern Recognition Letters 29 2008 1941 1946
    • (2008) Pattern Recognition Letters , vol.29 , pp. 1941-1946
    • Perdisci, R.1    Lanzi, A.2    Lee, W.3
  • 57
    • 0003120218 scopus 로고    scopus 로고
    • Sequential minimal optimization: A fast algorithm for training support vector machines
    • J. Platt Sequential minimal optimization: a fast algorithm for training support vector machines Advances in Kernel Methods-Support Vector Learning 208 1999
    • (1999) Advances in Kernel Methods-Support Vector Learning , vol.208
    • Platt, J.1
  • 58
    • 63449141090 scopus 로고    scopus 로고
    • The effectiveness of anti-malware tools
    • B. Potter, and G. Day The effectiveness of anti-malware tools Computer Fraud and Security 2009 2009 12 13
    • (2009) Computer Fraud and Security , vol.2009 , pp. 12-13
    • Potter, B.1    Day, G.2
  • 60
    • 33744584654 scopus 로고
    • Induction of decision trees
    • J. Quinlan Induction of decision trees Machine Learning 1 1986 81 106
    • (1986) Machine Learning , vol.1 , pp. 81-106
    • Quinlan, J.1
  • 62
    • 8844253324 scopus 로고    scopus 로고
    • Understanding inverse document frequency: On theoretical arguments for IDF
    • S. Robertson Understanding inverse document frequency: on theoretical arguments for IDF Journal of Documentation 60 2004 503 520
    • (2004) Journal of Documentation , vol.60 , pp. 503-520
    • Robertson, S.1
  • 64
    • 84874115897 scopus 로고    scopus 로고
    • second ed. Artificial Intelligence: A Modern Approach Prentice Hall
    • S.J. Russell Norvig second ed. Artificial Intelligence: A Modern Approach 2003 Prentice Hall
    • (2003) Norvig
    • Russell, S.J.1
  • 65
  • 68
    • 0037806811 scopus 로고    scopus 로고
    • The boosting approach to machine learning: An overview
    • R. Schapire The boosting approach to machine learning: an overview Lecture Notes in Statistics 2003 149 172
    • (2003) Lecture Notes in Statistics , pp. 149-172
    • Schapire, R.1
  • 70
    • 65749099969 scopus 로고    scopus 로고
    • Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey
    • A. Shabtai, R. Moskovitch, Y. Elovici, and C. Glezer Detection of malicious code by applying machine learning classifiers on static features: a state-of-the-art survey Information Security Technical Report 14 2009 16 29
    • (2009) Information Security Technical Report , vol.14 , pp. 16-29
    • Shabtai, A.1    Moskovitch, R.2    Elovici, Y.3    Glezer, C.4
  • 73
    • 67650330214 scopus 로고    scopus 로고
    • Comparative analysis of regression and machine learning methods for predicting fault proneness models
    • Y. Singh, A. Kaur, and R. Malhotra Comparative analysis of regression and machine learning methods for predicting fault proneness models International Journal of Computer Applications in Technology 35 2009 183 193
    • (2009) International Journal of Computer Applications in Technology , vol.35 , pp. 183-193
    • Singh, Y.1    Kaur, A.2    Malhotra, R.3
  • 76
    • 1942450610 scopus 로고    scopus 로고
    • Feature extraction by non parametric mutual information maximization
    • K. Torkkola Feature extraction by non parametric mutual information maximization The Journal of Machine Learning Research 3 2003 1415 1438
    • (2003) The Journal of Machine Learning Research , vol.3 , pp. 1415-1438
    • Torkkola, K.1
  • 79
    • 33644845063 scopus 로고    scopus 로고
    • Facilitating the application of support vector regression by using a universal Pearson VII function based kernel
    • B. Üstün, W. Melssen, and L. Buydens Facilitating the application of support vector regression by using a universal Pearson VII function based kernel Chemometrics and Intelligent Laboratory Systems 81 2006 29 40
    • (2006) Chemometrics and Intelligent Laboratory Systems , vol.81 , pp. 29-40
    • Üstün, B.1    Melssen, W.2    Buydens, L.3
  • 83
    • 3042824043 scopus 로고    scopus 로고
    • A study of smoothing methods for language models applied to information retrieval
    • C. Zhai, and J. Lafferty A study of smoothing methods for language models applied to information retrieval ACM Transactions on Information Systems 22 2004 179 214
    • (2004) ACM Transactions on Information Systems , vol.22 , pp. 179-214
    • Zhai, C.1    Lafferty, J.2
  • 85
    • 70349232273 scopus 로고    scopus 로고
    • Malware detection using adaptive data compression
    • ACM New York, NY, USA
    • Y. Zhou, and W. Inge Malware detection using adaptive data compression Proceedings of the 2008 ACM Workshop on AISec 2008 ACM New York, NY, USA 53 60
    • (2008) Proceedings of the 2008 ACM Workshop on AISec , pp. 53-60
    • Zhou, Y.1    Inge, W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.