메뉴 건너뛰기




Volumn 7, Issue 3, 2013, Pages 467-477

Malware target recognition of unknown threats

Author keywords

Advanced persistent threat; antivirus; intrusion detection; malware detection; situation awareness

Indexed keywords

ADVANCED PERSISTENT THREAT; ANTI VIRUS; ANTI-VIRUS SYSTEMS; ARCHITECTURAL COMPONENTS; MALWARE DETECTION; OPERATIONAL ENVIRONMENTS; SENSITIVE INFORMATIONS; SITUATION AWARENESS;

EID: 84880570808     PISSN: 19328184     EISSN: 19379234     Source Type: Journal    
DOI: 10.1109/JSYST.2012.2221913     Document Type: Article
Times cited : (23)

References (32)
  • 2
    • 84880572154 scopus 로고    scopus 로고
    • What APT is (and what it isn't)
    • R. Bejtlich, "What APT is (and what it isn't)," Inform. Security, vol. 12, no. 6, pp. 20-24, 2010.
    • (2010) Inform. Security , vol.12 , Issue.6 , pp. 20-24
    • Bejtlich, R.1
  • 3
    • 33646414637 scopus 로고    scopus 로고
    • The art of computer virus research and defense
    • IN Addison-Wesley
    • P. Szor, The Art of Computer Virus Research and Defense. Indianapolis, IN: Addison-Wesley, 2005.
    • (2005) Indianapolis
    • Szor, P.1
  • 4
    • 80052922553 scopus 로고    scopus 로고
    • SAS: Semantics aware signature generation for polymorphic worm detection
    • D. Kong, Y. Jhi, T. Gong, S. Zhu, P. Liu, and H. Xi, "SAS: Semantics aware signature generation for polymorphic worm detection," Int. J. Inform. Security, vol. 10, no. 5, pp. 269-283, 2011.
    • (2011) Int. J. Inform. Security , vol.10 , Issue.5 , pp. 269-283
    • Kong, D.1    Jhi, Y.2    Gong, T.3    Zhu, S.4    Liu, P.5    Xi, H.6
  • 6
    • 34748865971 scopus 로고    scopus 로고
    • A feature selection and evaluation scheme for computer virus detection
    • Dec
    • O. Henchiri and N. Japkowicz, "A feature selection and evaluation scheme for computer virus detection," in Proc. IEEE 6th Int. Conf. Data Mining, Dec. 2006, pp. 891-895.
    • (2006) Proc. IEEE 6th Int. Conf. Data Mining , pp. 891-895
    • Henchiri, O.1    Japkowicz, N.2
  • 8
    • 33845768389 scopus 로고    scopus 로고
    • Learning to detect and classify malicious executables in the wild
    • J. Kolter and M. Maloof, "Learning to detect and classify malicious executables in the wild," J. Mach. Learning Res., vol. 7, pp. 2721-2744, Dec. 2006. (Pubitemid 46011490)
    • (2006) Journal of Machine Learning Research , vol.7 , pp. 2721-2744
    • Zico Kolter, J.1    Maloof, M.A.2
  • 10
    • 84888464159 scopus 로고    scopus 로고
    • Sep 18 [Online]. Available
    • Norman ASA. (2009, Sep. 18). Norman Sandbox [Online]. Available: www.norman.com/technology/norman?sandbox/en-us
    • (2009) Norman Sandbox
    • Norman, A.S.A.1
  • 11
    • 84856009369 scopus 로고    scopus 로고
    • Sunbelt Software Sep 18 [Online]. Available
    • Sunbelt Software. (2009, Sep. 18). Sunbelt cwsandbox [Online]. Available: www.sunbeltsoftware.com/Developer/Sunbelt-CWSandbox/
    • (2009) Sunbelt Cwsandbox
  • 12
    • 84855986152 scopus 로고    scopus 로고
    • Feb 18 [Online]. Available
    • ThreatExpert Ltd. (2009, Feb. 18). Automated Threat Analysis [Online]. Available: www.threatexpert.com/
    • (2009) Automated Threat Analysis
    • Ltd, T.1
  • 16
    • 38149001240 scopus 로고    scopus 로고
    • Behavioral classification
    • Apr
    • T. Lee and J. J. Mody, "Behavioral classification," in Proc. EICAR, Apr. 2006, pp. 159-174.
    • (2006) Proc. EICAR , pp. 159-174
    • Lee, T.1    Mody, J.J.2
  • 17
    • 48649087530 scopus 로고    scopus 로고
    • Limits of static analysis for malware detection
    • A. Moser, C. Kruegel, and E. Kirda, "Limits of static analysis for malware detection," in Proc. ACSAC, 2007, pp. 421-430.
    • (2007) Proc. ACSAC , pp. 421-430
    • Moser, A.1    Kruegel, C.2    Kirda, E.3
  • 18
    • 84880570814 scopus 로고    scopus 로고
    • Understanding heuristics: Symantec's bloodhound technology
    • Symantec Corporation
    • Symantec Corporation, "Understanding heuristics: Symantec's bloodhound technology," Symantec White Paper Series, vol. XXXIV, no. 1, pp. 1-14, 1997.
    • (1997) Symantec White Paper Series , vol.34 , Issue.1 , pp. 1-14
  • 21
    • 84855995264 scopus 로고    scopus 로고
    • Improving heuristics
    • Aug
    • N. Rafiq and Y. Mao, "Improving heuristics," Virus Bull., pp. 9-12, Aug. 2008.
    • (2008) Virus Bull , pp. 9-12
    • Rafiq, N.1    Mao, Y.2
  • 22
    • 70350057168 scopus 로고    scopus 로고
    • A heuristic approach for detection of obfuscated malware
    • Jun
    • S. Treadwell and M. Zhou, "A heuristic approach for detection of obfuscated malware," in Proc. Intell. Security Inform., Jun. 2009, pp. 291-299.
    • (2009) Proc. Intell. Security Inform , pp. 291-299
    • Treadwell, S.1    Zhou, M.2
  • 23
    • 0003552088 scopus 로고
    • Automatic extraction of computer virus signatures
    • J. O. Kephart and B. Arnold, "Automatic extraction of computer virus signatures," in Proc. 4th Virus Bull. Int. Conf., 1994, pp. 178-184.
    • (1994) Proc. 4th Virus Bull. Int. Conf , pp. 178-184
    • Kephart, J.O.1    Arnold, B.2
  • 24
    • 2342473490 scopus 로고    scopus 로고
    • Automatically generated Win32 heuristic virus detection
    • Sep
    • W. Arnold and G. Tesauro, "Automatically generated Win32 heuristic virus detection," in Proc. Virus Bull. Conf., Sep. 2000, pp. 51-60.
    • (2000) Proc. Virus Bull. Conf , pp. 51-60
    • Arnold, W.1    Tesauro, G.2
  • 27
    • 84924223669 scopus 로고    scopus 로고
    • Static analysis of executables to detect malicious patterns
    • M. Christodorescu and S. Jha, "Static analysis of executables to detect malicious patterns," in Proc. 12th USENIX Security Symp., 2003, pp. 169-186.
    • (2003) Proc. 12th USENIX Security Symp , pp. 169-186
    • Christodorescu, M.1    Jha, S.2
  • 28
    • 0004046658 scopus 로고    scopus 로고
    • A taxonomy of obfuscating transformations
    • Dept. Comput. Sci. Univ. Auckland, Auckland, New Zealand Jul
    • C. Collberg, C. Thomborson, and D. Low, "A taxonomy of obfuscating transformations," Dept. Comput. Sci., Univ. Auckland, Auckland, New Zealand, Tech. Rep. 148, Jul. 1997.
    • (1997) Tech. Rep 148
    • Collberg, C.1    Thomborson, C.2    Low, D.3
  • 30
    • 84880574021 scopus 로고    scopus 로고
    • Math Works Inc May 12 [Online] Available
    • MathWorks, Inc. (2010, May 12). TreeBagger [Online]. Available: www. mathworks.com/help/toolbox/stats/treebagger.html
    • (2010) Tree Bagger
  • 32
    • 78649268422 scopus 로고    scopus 로고
    • Apr. 15 [Online] Available: vx.netlux.org/vl.php
    • VX Heavens. (2010, Apr. 15). Virus Collection [Online]. Available: vx. netlux.org/vl.php
    • (2010) Virus Collection
    • Heavens, V.X.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.