메뉴 건너뛰기




Volumn 44, Issue , 2014, Pages 65-74

Control flow-based opcode behavior analysis for Malware detection

Author keywords

Classification; Control flow graph; Machine learning; Malicious code detection; Opcode sequence; Security

Indexed keywords

ARTIFICIAL INTELLIGENCE; CLASSIFICATION (OF INFORMATION); COMPUTER CRIME; DATA FLOW ANALYSIS; LEARNING SYSTEMS; NETWORK SECURITY;

EID: 84902256384     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2014.04.003     Document Type: Article
Times cited : (79)

References (26)
  • 1
    • 0032786569 scopus 로고    scopus 로고
    • Improving support vector machine classifiers by modifying kernel functions
    • DOI 10.1016/S0893-6080(99)00032-5, PII S0893608099000325
    • S. Amari, and S. Wu Improving support vector machine classifiers by modifying kernel functions Neural Netw 12 1999 783 789 (Pubitemid 29359218)
    • (1999) Neural Networks , vol.12 , Issue.6 , pp. 783-789
    • Amari, S.1    Wu, S.2
  • 3
    • 27544465088 scopus 로고    scopus 로고
    • Anomaly intrusion detection for system call using the soundex algorithm and neural networks
    • Proceedings - 10th IEEE Symposium on Computers and Communications, ISCC 2005
    • B.R. Cha, B. Vaidya, and S. Han Anomaly intrusion detection for system call using the Soundex algorithm and Neural networks 10th IEEE symposium on Computer and communications, Cartagena, Murcia, Spain June 2005 427 433 (Pubitemid 41543309)
    • (2005) Proceedings - IEEE Symposium on Computers and Communications , pp. 427-433
    • Cha, B.1    Vaidya, B.2    Han, S.3
  • 5
    • 80051781512 scopus 로고    scopus 로고
    • Feature representation and selection in malicious code detection methods based on static system calls
    • Y. Ding, X. Yuan, D. Zhou, L. Dong, and Z. An Feature representation and selection in malicious code detection methods based on static system calls Comput Secur 30 2011 514 524
    • (2011) Comput Secur , vol.30 , pp. 514-524
    • Ding, Y.1    Yuan, X.2    Zhou, D.3    Dong, L.4    An, Z.5
  • 6
    • 84888871015 scopus 로고    scopus 로고
    • A fast malware detection algorithm based on objective-oriented association mining
    • Y. Ding, X. Yuan, K. Tang, X. Xiao, and Y. Zhang A fast malware detection algorithm based on objective-oriented association mining Comput Secur 39 2013 315 324
    • (2013) Comput Secur , vol.39 , pp. 315-324
    • Ding, Y.1    Yuan, X.2    Tang, K.3    Xiao, X.4    Zhang, Y.5
  • 9
    • 80051792443 scopus 로고    scopus 로고
    • [Available from] [accessed 23.03.10]
    • Hex-Rays SA IDA pro Introduction 2009 [Available from] http://www.hex-rays.com/products.shtml/ [accessed 23.03.10]
    • (2009) IDA Pro Introduction
    • Sa, H.1
  • 10
    • 84874105145 scopus 로고    scopus 로고
    • Opcode sequences as representation of executables for data-mining-based unknown malware detection
    • S. Igor, B. Felix, U.P. Xabier, and G.B. Pablo Opcode sequences as representation of executables for data-mining-based unknown malware detection Information.Science 231 2013 64 82
    • (2013) Information.Science , vol.231 , pp. 64-82
    • Igor, S.1    Felix, B.2    Xabier, U.P.3    Pablo, G.B.4
  • 16
    • 80051780701 scopus 로고    scopus 로고
    • netlux.org (accessed 23.03.10)
    • netlux.org. (2009). Malicious code samples available from: http://vx.netlux.org/ (accessed 23.03.10).
    • (2009) Malicious Code Samples
  • 17
    • 84902268375 scopus 로고    scopus 로고
    • Offensive Computing (accessed 23.03.10)
    • Offensive Computing. (2005). Malicious code samples available from: http://www.offensivecomputing.net/ (accessed 23.03.10).
    • (2005) Malicious Code Samples
  • 18
    • 84888868663 scopus 로고    scopus 로고
    • [Available from] [accessed 23.03.10]
    • Peid Peid v0.94 2007 [Available from] http://www.peid.info/ [accessed 23.03.10]
    • (2007) Peid v0.94
  • 20
    • 45549117987 scopus 로고
    • Term-weighting approaches in automatic text retrieval
    • G. Salton, and C. Buckley Term-weighting approaches in automatic text retrieval Information Process Manag 24 5 1988 513 523
    • (1988) Information Process Manag , vol.24 , Issue.5 , pp. 513-523
    • Salton, G.1    Buckley, C.2
  • 21
    • 65749099969 scopus 로고    scopus 로고
    • Detection of malicious code by applying machine learning classifiers on static features - A State-Of-The-Art Survey
    • A. Shabtai, R. Moskovitch, Y. Elovici, and C. Glezer Detection of malicious code by applying machine learning classifiers on static features - a State-of-the-Art Survey Inf Secur Tech Rep 14 1 2009 16 29
    • (2009) Inf Secur Tech Rep , vol.14 , Issue.1 , pp. 16-29
    • Shabtai, A.1    Moskovitch, R.2    Elovici, Y.3    Glezer, C.4
  • 23
    • 0037209446 scopus 로고    scopus 로고
    • Host-based intrusion detection using dynamic and static behavioral models
    • D.Y. Yeung, and Y. Ding Host-based intrusion detection using dynamic and static behavioral models Pattern Recognit 36 1 2003 229 243
    • (2003) Pattern Recognit , vol.36 , Issue.1 , pp. 229-243
    • Yeung, D.Y.1    Ding, Y.2
  • 24
    • 56549097799 scopus 로고    scopus 로고
    • High-order Markov kernels for intrusion detection
    • C. Yin, S. Tian, and S. Mu High-order Markov kernels for intrusion detection Neurocomputing 71 2008 3247 3252
    • (2008) Neurocomputing , vol.71 , pp. 3247-3252
    • Yin, C.1    Tian, S.2    Mu, S.3
  • 26
    • 84890752534 scopus 로고    scopus 로고
    • Malware detection method based on the control-flow construct feature of software
    • Z. Zhao, J. Wang, and J. Bai Malware detection method based on the control-flow construct feature of software Inf Secur IET 8 1 2014 18 24
    • (2014) Inf Secur IET , vol.8 , Issue.1 , pp. 18-24
    • Zhao, Z.1    Wang, J.2    Bai, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.