메뉴 건너뛰기




Volumn 2014-November, Issue November, 2014, Pages 27-36

Poisoning behavioral malware clustering

Author keywords

Adversarial machine learning; Clustering; Computer security; Malware detection; Security evaluation; Unsupervised learning

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER VIRUSES; INPUT OUTPUT PROGRAMS; NETWORK SECURITY; SECURITY OF DATA; SECURITY SYSTEMS; UNSUPERVISED LEARNING;

EID: 84937712787     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2666652.2666666     Document Type: Conference Paper
Times cited : (123)

References (35)
  • 8
    • 84867136631 scopus 로고    scopus 로고
    • Poisoning attacks against support vector machines
    • J. Langford and J. Pineau, editors, Omnipress
    • B. Biggio, B. Nelson, and P. Laskov. Poisoning attacks against support vector machines. In J. Langford and J. Pineau, editors, 29th Int'l Conf. on Machine Learning. Omnipress, 2012.
    • (2012) 29th Int'l Conf. on Machine Learning
    • Biggio, B.1    Nelson, B.2    Laskov, P.3
  • 10
    • 84869200775 scopus 로고    scopus 로고
    • Static prediction games for adversarial learning problems
    • M. Brückner, C. Kanzow, and T. Scheffer. Static prediction games for adversarial learning problems. J. Mach. Learn. Res., 13:2617{2654, 2012.
    • (2012) J. Mach. Learn. Res , vol.13 , pp. 2617-2654
    • Brückner, M.1    Kanzow, C.2    Scheffer, T.3
  • 13
    • 85075837457 scopus 로고    scopus 로고
    • Clustering Analysis of Network Traffic for Protocol- And Structure-Independent Botnet Detection
    • G. Gu, R. Perdisci, J. Zhang, and W. Lee. BotMiner: Clustering Analysis of Network Traffic for Protocol- And Structure-Independent Botnet Detection. In Proc. of USENIX Security Symposium, 2008.
    • (2008) Proc. of USENIX Security Symposium
    • Gu, G.1    Perdisci, R.2    Zhang, J.3    Botminer W.Lee.4
  • 16
    • 84893321362 scopus 로고    scopus 로고
    • DUET: Integration of dynamic and static analyses for malware clustering with cluster ensembles
    • ACSAC
    • X. Hu and K. G. Shin. DUET: Integration of dynamic and static analyses for malware clustering with cluster ensembles. In Proc. of Annual Computer Security Applications Conference (ACSAC), 2013.
    • (2013) Proc. of Annual Computer Security Applications Conference
    • Hu, X.1    Shin, K.G.2
  • 18
    • 84937688483 scopus 로고    scopus 로고
    • visited April
    • iSeclab. Anubis. http://anubis.iseclab.org, visited April, 2014.
    • (2014) ISeclab. Anubis
  • 19
    • 84893405732 scopus 로고    scopus 로고
    • Data clustering: A review
    • Sept
    • A. K. Jain, M. N. Murty, and P. J. Flynn. Data clustering: A review. ACM Comput. Surv., 31(3):264{323, Sept. 1999.
    • (1999) ACM Comput. Surv , vol.31 , Issue.3 , pp. 264-323
    • Jain, A.K.1    Murty, M.N.2    Flynn, P.J.3
  • 21
    • 84967071046 scopus 로고    scopus 로고
    • Kaspersky Lab
    • Kaspersky Lab. KASPERSKY SECURITY BULLETIN 2013. http://media.kaspersky.com/pdf/KSB-2013-EN.pdf, 2014.
    • (2014) KASPERSKY SECURITY BULLETIN 2013
  • 23
    • 84904807829 scopus 로고    scopus 로고
    • Feature weighting for improved classiffier robustness
    • (CEAS), Mountain View, CA, USA, 16/07/2009
    • A. Kolcz and C. H. Teo. Feature weighting for improved classiffier robustness. In Sixth Conference on Email and Anti-Spam (CEAS), Mountain View, CA, USA, 16/07/2009 2009.
    • (2009) Sixth Conference on Email and Anti-Spam
    • Kolcz, A.1    Teo, C.H.2
  • 24
    • 84875216992 scopus 로고    scopus 로고
    • Scalable finegrained behavioral clustering of http-based malware
    • R. Perdisci, D. Ariu, and G. Giacinto. Scalable finegrained behavioral clustering of http-based malware. Computer Networks, 57(2):487 { 500, 2013.
    • (2013) Computer Networks , vol.57 , Issue.2 , pp. 487-500
    • Perdisci, R.1    Ariu, D.2    Giacinto, G.3
  • 28
    • 79958743806 scopus 로고    scopus 로고
    • Automatic analysis of malware behavior using machine learning
    • K. Rieck, P. Trinius, C. Willems, and T. Holz. Automatic analysis of malware behavior using machine learning. J. Comput. Secur., 19(4):639{668, 2011.
    • (2011) J. Comput. Secur , vol.19 , Issue.4 , pp. 639-668
    • Rieck, K.1    Trinius, P.2    Willems, C.3    Holz, T.4
  • 29
    • 84958984156 scopus 로고    scopus 로고
    • Undermining an anomaly-based intrusion detection system using common exploits
    • RAID
    • K. Tan, K. Killourhy, and R. Maxion. Undermining an anomaly-based intrusion detection system using common exploits. In Recent Adances in Intrusion Detection (RAID), pages 54{73, 2002.
    • (2002) Recent Adances in Intrusion Detection , pp. 54-73
    • Tan, K.1    Killourhy, K.2    Maxion, R.3
  • 30
    • 0036085540 scopus 로고    scopus 로고
    • Defining the operational limits of stide, an anomaly-based intrusion detector
    • Why 6
    • K. Tan and R. Maxion. \Why 6?" Defining the operational limits of stide, an anomaly-based intrusion detector. In Proc. of IEEE Symposium on Security and Privacy, pages 188{201, 2002.
    • (2002) Proc. of IEEE Symposium on Security and Privacy , pp. 188-201
    • Tan, K.1    Maxion, R.2
  • 31
    • 84855795320 scopus 로고    scopus 로고
    • A malware instruction set for behavior-based analysis
    • (Sicherheit, Schutz und Verlasslichkeit), Oct
    • P. Trinius, C. Willems, T. Holz, and K. Rieck. A malware instruction set for behavior-based analysis. In Proc. of GI Conference \Sicherheit" (Sicherheit, Schutz und Verlasslichkeit), pages 205{216, Oct. 2010.
    • (2010) Proc. of GI Conference \Sicherheit , pp. 205-216
    • Trinius, P.1    Willems, C.2    Holz, T.3    Rieck, K.4
  • 33
    • 84893332856 scopus 로고    scopus 로고
    • VirusTotal. https://www.virustotal.com.
    • VirusTotal
  • 35
    • 34047110218 scopus 로고    scopus 로고
    • CWSandbox: Towards automated dynamic binary analysis
    • C. Willems, T. Holz, and F. Freiling. CWSandbox: Towards automated dynamic binary analysis. IEEE Security and Privacy, 5(2):32{39, 2007.
    • (2007) IEEE Security and Privacy , vol.5 , Issue.2 , pp. 32-39
    • Willems, C.1    Holz, T.2    Freiling, F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.