메뉴 건너뛰기




Volumn , Issue , 2013, Pages 113-120

A survey on heuristic malware detection techniques

Author keywords

API Call; Computer Security; Control Flow Graph; Malware Detection; N Gram; OpCode

Indexed keywords

API CALLS; CONTROL FLOW GRAPHS; MALWARE DETECTION; N-GRAM; OPCODE;

EID: 84888622633     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IKT.2013.6620049     Document Type: Conference Paper
Times cited : (239)

References (47)
  • 4
    • 84888614014 scopus 로고    scopus 로고
    • KALPA
    • KALPA, "Introduction to Malware", "http:// securityresearch.in/index.php/projects/malware
    • (2011) Introduction to Malware
  • 5
    • 48349134267 scopus 로고    scopus 로고
    • Behavioral detection of malware: From a survey towards an established taxonomy
    • G. Jacob, H. Debar, and E. Filiol, "Behavioral detection of malware: from a survey towards an established taxonomy," Journal in Computer Virology, pp. 251-266, 2008.
    • (2008) Journal in Computer Virology , pp. 251-266
    • Jacob, G.1    Debar, H.2    Filiol, E.3
  • 8
    • 0034838197 scopus 로고    scopus 로고
    • Data mining methods for detection of new malicious executables
    • IEEE COMPUTER SOCIETY
    • M. Schultz, E. Eskin, E. Zadok, and S. Stolfo, "Data mining methods for detection of new malicious executables.," in IEEE Symposium on Security and Privacy, pages 38-49. IEEE COMPUTER SOCIETY, 2001.
    • (2001) IEEE Symposium on Security and Privacy , pp. 38-49
    • Schultz, M.1    Eskin, E.2    Zadok, E.3    Stolfo, S.4
  • 15
    • 77951206726 scopus 로고    scopus 로고
    • CIMDS: Adapting postprocessing techniques of associative classification for malware detection
    • Y. Ye, T. Li, Q. Jiang, and Y. Wang, "CIMDS: adapting postprocessing techniques of associative classification for malware detection," IEEE Trans. Syst., Man, Cybern. C, Vol. 40, no. 3, pp. 298-307, 2010.
    • (2010) IEEE Trans. Syst., Man, Cybern. C , vol.40 , Issue.3 , pp. 298-307
    • Ye, Y.1    Li, T.2    Jiang, Q.3    Wang, Y.4
  • 16
  • 17
    • 84888624862 scopus 로고    scopus 로고
    • Code graph for malware detection. In information networking
    • International Conference on, Jan
    • K. Jeong and H. Lee, "Code graph for malware detection. In Information Networking.," ICOIN. International Conference on, Jan 2008.
    • (2008) ICOIN
    • Jeong, K.1    Lee, H.2
  • 18
  • 19
    • 77954348690 scopus 로고    scopus 로고
    • Hierarchical associative classifier (HAC) for malware detection from the large and imbalanced gray list
    • Y. Ye, T. Li, K. Huang, Q. Jiang and Y. Chen, "Hierarchical associative classifier (HAC) for malware detection from the large and imbalanced gray list,". Journal of Intelligent Information Systems, 35(1), pp. 1-20. 2010.
    • (2010) Journal of Intelligent Information Systems , vol.35 , Issue.1 , pp. 1-20
    • Ye, Y.1    Li, T.2    Huang, K.3    Jiang, Q.4    Chen, Y.5
  • 22
    • 24344458137 scopus 로고    scopus 로고
    • Feature selection based on mutual information: Cri-teria of max-dependency, max-relevance, and min-redundancy
    • C. Peng, H. Long and F. Ding, "Feature selection based on mutual information: cri-teria of max-dependency, max-relevance, and min-redundancy.," in IEEE Transactions on Pattern Analysis and Machine Intelligence, 2005.
    • (2005) IEEE Transactions on Pattern Analysis and Machine Intelligence
    • Peng, C.1    Long, H.2    Ding, F.3
  • 23
    • 84861726546 scopus 로고    scopus 로고
    • OpCode sequences as representation of executables for data-mining-based unknown malware detection
    • Aug.
    • I. Santos, F. Brezo, X. Ugarte-Pedrero, and P. G. Bringas, "OpCode sequences as representation of executables for data-mining-based unknown malware detection," Information Sciences, Aug. 2011.
    • (2011) Information Sciences
    • Santos, I.1    Brezo, F.2    Ugarte-Pedrero, X.3    Bringas, P.G.4
  • 25
    • 82055172109 scopus 로고    scopus 로고
    • Using opCode sequences in single-class learning to detect unknown malware
    • I. Santos, F. Brezo, B. Sanz, C. Laorden, and P. G. Bringas, "Using opCode sequences in single-class learning to detect unknown malware," IET Information Security, Vol. 5, no. 4, p. 220, 2011.
    • (2011) IET Information Security , vol.5 , Issue.4 , pp. 220
    • Santos, I.1    Brezo, F.2    Sanz, B.3    Laorden, C.4    Bringas, P.G.5
  • 27
    • 84860621757 scopus 로고    scopus 로고
    • OpCode graph similarity and metamorphic detection
    • Apr.
    • N. Runwal, R. M. Low, and M. Stamp, "OpCode graph similarity and metamorphic detection," Journal in Computer Virology, Vol. 8, no. 1-2, pp. 37-52, Apr. 2012.
    • (2012) Journal in Computer Virology , vol.8 , Issue.1-2 , pp. 37-52
    • Runwal, N.1    Low, R.M.2    Stamp, M.3
  • 28
    • 84872176999 scopus 로고    scopus 로고
    • Detecting unknown malicious code by applying classification techniques on OpCode patterns
    • A. Shabtai, R. Moskovitch, C. Feher, S. Dolev, and Y. Elovici, "Detecting unknown malicious code by applying classification techniques on OpCode patterns," Security Informatics, Vol. 1, no. 1, p. 1, 2012.
    • (2012) Security Informatics , vol.1 , Issue.1 , pp. 1
    • Shabtai, A.1    Moskovitch, R.2    Feher, C.3    Dolev, S.4    Elovici, Y.5
  • 31
    • 2342473490 scopus 로고    scopus 로고
    • Automatically generated win32 heuristic virus detection
    • W.A.
    • W. A. and G Tesauro, "Automatically Generated Win32 Heuristic Virus Detection," in Virus Bulletin Conference, 2000.
    • (2000) Virus Bulletin Conference
    • Tesauro, G.1
  • 34
    • 33846600066 scopus 로고    scopus 로고
    • Comparison of feature selection and classification algorithms in identifying malicious executables
    • T. J. Cai DM, M. Gokhale, "Comparison of feature selection and classification algorithms in identifying malicious executables," in Computational Statistics and Data Analysis, 2007.
    • (2007) Computational Statistics and Data Analysis
    • Cai, T.J.D.M.1    Gokhale, M.2
  • 41
    • 0002337827 scopus 로고    scopus 로고
    • Machine learning and data mining
    • T. M. Mitchell, "Machine learning and data mining," Commun. ACM, Vol. 42, no. 11, 1999.
    • (1999) Commun. ACM , vol.42 , Issue.11
    • Mitchell, T.M.1
  • 42
    • 0030211964 scopus 로고    scopus 로고
    • Bagging predictors
    • L. Breiman. "Bagging Predictors.," Machine Learning, 24(2):123-140, 1996.
    • (1996) Machine Learning , vol.24 , Issue.2 , pp. 123-140
    • Breiman, L.1
  • 43
    • 0035478854 scopus 로고    scopus 로고
    • Random forests
    • L. Breiman. "Random Forests.," Machine Learning, 45(1):5-32, 2001.
    • (2001) Machine Learning , vol.45 , Issue.1 , pp. 5-32
    • Breiman, L.1
  • 44
    • 63149089127 scopus 로고    scopus 로고
    • Control flow graphs as malware signatures
    • May
    • G. Bonfante, M. Kaczmarek, J.Y. Marion. "Control Flow Graphs as Malware Signatures.," WTCV, May, 2007.
    • (2007) WTCV
    • Bonfante, G.1    Kaczmarek, M.2    Marion, J.Y.3
  • 46
    • 83755220464 scopus 로고    scopus 로고
    • Using multi-feature and classifier ensembles to improve malware detection
    • Y. Lu, S. Din, C. Zheng and B. Gao "Using multi-feature and classifier ensembles to improve malware detection,". Journal of CCIT 39(2), 57-72. 2010.
    • (2010) Journal of CCIT , vol.39 , Issue.2 , pp. 57-72
    • Lu, Y.1    Din, S.2    Zheng, C.3    Gao, B.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.