메뉴 건너뛰기




Volumn 420 CCIS, Issue , 2014, Pages 440-450

Static Malware Analysis Using Machine Learning Methods

Author keywords

Advanced Persistent Threat; Cyber Defence; Machine Learning; Malware; Static Analysis

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER CRIME; LEARNING SYSTEMS; NETWORK SECURITY; STATIC ANALYSIS;

EID: 84904757898     PISSN: 18650929     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-54525-2_39     Document Type: Conference Paper
Times cited : (78)

References (44)
  • 7
    • 85149612939 scopus 로고
    • Fast effective rule induction
    • Cohen, W.W.: Fast effective rule induction. ICML 95, 115-123 (1995)
    • (1995) ICML , vol.95 , pp. 115-123
    • Cohen, W.W.1
  • 14
    • 34249847782 scopus 로고    scopus 로고
    • Formalisation and implementation aspects of k-ary (malicious) codes
    • Filiol, E.: Formalisation and implementation aspects of k-ary (malicious) codes. Journal in Computer Virology 3(2), 75-86 (2007)
    • (2007) Journal In Computer Virology , vol.3 , Issue.2 , pp. 75-86
    • Filiol, E.1
  • 17
    • 33845768389 scopus 로고    scopus 로고
    • Learning to detect and classify malicious executables in the wild
    • Kolter, J.Z., Maloof, M.A.: Learning to detect and classify malicious executables in the wild. The Journal of Machine Learning Research 7, 2721-2744 (2006)
    • (2006) The Journal of Machine Learning Research , vol.7 , pp. 2721-2744
    • Kolter, J.Z.1    Maloof, M.A.2
  • 18
    • 37749050180 scopus 로고    scopus 로고
    • Dynamic weighted majority: An ensemble method for drifting concepts
    • Kolter, J.Z., Maloof, M.A.: Dynamic weighted majority: An ensemble method for drifting concepts. The Journal of Machine Learning Research 8, 2755-2790 (2007)
    • (2007) The Journal of Machine Learning Research , vol.8 , pp. 2755-2790
    • Kolter, J.Z.1    Maloof, M.A.2
  • 22
    • 70449730263 scopus 로고    scopus 로고
    • Trojan side-channels: Lightweight hardware trojans through side-channel engineering
    • In: Clavier, C., Gaj, K. (eds.), LNCS, Springer, Heidelberg
    • Lin, L., Kasper, M., G̈uneysu, T., Paar, C., Burleson, W.: Trojan side-channels: Lightweight hardware trojans through side-channel engineering. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 382-395. Springer, Heidelberg (2009)
    • (2009) CHES 2009 , vol.5747 , pp. 382-395
    • Lin, L.1    Kasper, M.2    G̈uneysu, T.3    Paar, C.4    Burleson, W.5
  • 23
    • 84904731397 scopus 로고    scopus 로고
    • N-victims: An approach to determine nvictims for apt investigations
    • In: Lee, D.H., Yung, M. (eds.), Springer, Heidelberg
    • Liu, S.-T., Chen, Y.-M., Hung, H.-C.: N-victims: An approach to determine nvictims for apt investigations. In: Lee, D.H., Yung, M. (eds.) WISA 2012. LNCS, vol. 7690, pp. 226-240. Springer, Heidelberg (2012)
    • (2012) WISA 2012. LNCS , vol.7690 , pp. 226-240
    • Liu, S.-T.1    Chen, Y.-M.2    Hung, H.-C.3
  • 24
    • 83755220464 scopus 로고    scopus 로고
    • Using multi-feature and classifier ensembles to improve malware detection
    • Lu, Y., Din, S., Zheng, C., Gao, B.: Using multi-feature and classifier ensembles to improve malware detection. Journal of CCIT 39(2), 57-72 (2010)
    • (2010) Journal of CCIT , vol.39 , Issue.2 , pp. 57-72
    • Lu, Y.1    Din, S.2    Zheng, C.3    Gao, B.4
  • 25
    • 34047129159 scopus 로고    scopus 로고
    • Using entropy analysis to find encrypted and packed malware
    • Lyda, R., Hamrock, J.: Using entropy analysis to find encrypted and packed malware. IEEE Security & Privacy 5(2), 40-45 (2007)
    • (2007) IEEE Security & Privacy , vol.5 , Issue.2 , pp. 40-45
    • Lyda, R.1    Hamrock, J.2
  • 27
    • 84904745533 scopus 로고    scopus 로고
    • Key internet operator verisign hit by hackers
    • February 2
    • Menn, J.: Key internet operator verisign hit by hackers. Reuters (February 2, 2012)
    • (2012) Reuters
    • Menn, J.1
  • 29
    • 84904735646 scopus 로고    scopus 로고
    • Prosecutors, Public: Messiah spyware infects middle east targets
    • Prosecutors, Public: Messiah spyware infects middle east targets
  • 32
    • 82055172109 scopus 로고    scopus 로고
    • Using opcode sequences in single-class learning to detect unknown malware
    • Santos, I., Brezo, F., Sanz, B., Laorden, C., Bringas, P.G.: Using opcode sequences in single-class learning to detect unknown malware. IET Information Security 5(4), 220-227 (2011)
    • (2011) IET Information Security , vol.5 , Issue.4 , pp. 220-227
    • Santos, I.1    Brezo, F.2    Sanz, B.3    Laorden, C.4    Bringas, P.G.5
  • 33
    • 84861726546 scopus 로고    scopus 로고
    • Opcode sequences as representation of executables for data-mining-based unknown malware detection
    • Santos, I., Brezo, F., Ugarte-Pedrero, X., Bringas, P.G.: Opcode sequences as representation of executables for data-mining-based unknown malware detection. Information Sciences (2011)
    • (2011) Information Sciences
    • Santos, I.1    Brezo, F.2    Ugarte-Pedrero, X.3    Bringas, P.G.4
  • 34
    • 80052977357 scopus 로고    scopus 로고
    • Semi-supervised learning for unknown malware detection
    • Abraham, A., Corchado, J.M., González, S.R., De Paz Santana, J.F. (eds.) AISC, Springer, Heidelberg
    • Santos, I., Nieves, J., Bringas, P.G.: Semi-supervised learning for unknown malware detection. In: Abraham, A., Corchado, J.M., González, S.R., De Paz Santana, J.F. (eds.) International Symposium on DCAI. AISC, vol. 91, pp. 415-422. Springer, Heidelberg (2011)
    • (2011) International Symposium On DCAI , vol.91 , pp. 415-422
    • Santos, I.1    Nieves, J.2    Bringas, P.G.3
  • 36
    • 65749099969 scopus 로고    scopus 로고
    • Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey
    • Shabtai, A., Moskovitch, R., Elovici, Y., Glezer, C.: Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey. Information Security Technical Report 14(1), 16-29 (2009)
    • (2009) Information Security Technical Report , vol.14 , Issue.1 , pp. 16-29
    • Shabtai, A.1    Moskovitch, R.2    Elovici, Y.3    Glezer, C.4
  • 37
    • 79958243228 scopus 로고    scopus 로고
    • Pe-probe: Leveraging packer detection and structural information to detect malicious portable executables
    • Shafiq, M., Tabish, S., Farooq, M.: Pe-probe: leveraging packer detection and structural information to detect malicious portable executables. In: Proceedings of the Virus Bulletin Conference (VB), pp. 29-33 (2009)
    • (2009) Proceedings of the Virus Bulletin Conference (VB) , pp. 29-33
    • Shafiq, M.1    Tabish, S.2    Farooq, M.3
  • 39
    • 76649143365 scopus 로고    scopus 로고
    • Pe-miner:Mining structural information to detect malicious executables in realtime
    • In: Kirda, E., Jha, S., Balzarotti, D. (eds.), Springer, Heidelberg
    • Shafiq, M.Z., Tabish, S.M., Mirza, F., Farooq, M.: Pe-miner:mining structural information to detect malicious executables in realtime. In: Kirda, E., Jha, S., Balzarotti, D. (eds.) RAID 2009. LNCS, vol. 5758, pp. 121-141. Springer, Heidelberg (2009)
    • (2009) RAID 2009. LNCS , vol.5758 , pp. 121-141
    • Shafiq, M.Z.1    Tabish, S.M.2    Mirza, F.3    Farooq, M.4
  • 42
    • 0043037096 scopus 로고    scopus 로고
    • Open problems in computer virus research
    • White, S.R.: Open problems in computer virus research. In: Virus Bulletin Conference (1998)
    • (1998) Virus Bulletin Conference
    • White, S.R.1
  • 43
    • 79961077465 scopus 로고    scopus 로고
    • Google hack attack was ultra sophisticated, new details show
    • Zetter, K.: Google hack attack was ultra sophisticated, new details show. Wired Magazine 14 (2010)
    • (2010) Wired Magazine , pp. 14
    • Zetter, K.1
  • 44
    • 38049020213 scopus 로고    scopus 로고
    • Malicious codes detection based on ensemble learning
    • In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds.), Springer, Heidelberg
    • Zhang, B., Yin, J., Hao, J., Zhang, D., Wang, S.: Malicious codes detection based on ensemble learning. In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds.) ATC 2007. LNCS, vol. 4610, pp. 468-477. Springer, Heidelberg (2007)
    • (2007) ATC 2007. LNCS , vol.4610 , pp. 468-477
    • Zhang, B.1    Yin, J.2    Hao, J.3    Zhang, D.4    Wang, S.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.