메뉴 건너뛰기




Volumn 11, Issue 2, 2015, Pages 59-73

Hidden Markov models for malware classification

Author keywords

[No Author keywords available]

Indexed keywords

CLASSIFICATION (OF INFORMATION); CLUSTERING ALGORITHMS; COMPUTER CRIME; MALWARE; MARKOV PROCESSES; TRELLIS CODES;

EID: 84941220421     PISSN: 22742042     EISSN: 22638733     Source Type: Journal    
DOI: 10.1007/s11416-014-0215-x     Document Type: Article
Times cited : (88)

References (36)
  • 2
    • 67349123665 scopus 로고    scopus 로고
    • Profile hidden Markov models and metamorphic virus detection
    • Attaluri, S., McGhee, S., Stamp, M.: Profile hidden Markov models and metamorphic virus detection. J. Comput. Virol. 5(2), 151–169 (2009)
    • (2009) J. Comput. Virol. , vol.5 , Issue.2 , pp. 151-169
    • Attaluri, S.1    McGhee, S.2    Stamp, M.3
  • 5
    • 0031191630 scopus 로고    scopus 로고
    • The use of the area under the ROC curve in the evaluation of machine learning algorithms
    • Bradley, A.P.: The use of the area under the ROC curve in the evaluation of machine learning algorithms. Pattern Recognit. 30, 1145–1159 (1997)
    • (1997) Pattern Recognit , vol.30 , pp. 1145-1159
    • Bradley, A.P.1
  • 6
    • 84893187027 scopus 로고    scopus 로고
    • Canzanese, R., Kam, M., Mancoridis, S.: Toward an automatic, online behavioral malware classification system
    • Canzanese, R., Kam, M., Mancoridis, S.: Toward an automatic, online behavioral malware classification system. https://www.cs.drexel.edu/~spiros/papers/saso2013.pdf (2013)
    • (2013)
  • 8
    • 49449098182 scopus 로고    scopus 로고
    • What is the expectation maximization algorithm?
    • Do, C.B., Batzoglou, S
    • Do, C.B., Batzoglou, S.: What is the expectation maximization algorithm? Nat. Biotechnol. 26(8), 897–899. http://ai.stanford.edu/~chuongdo/papers/em_tutorial.pdf (2008)
    • Nat. Biotechnol. , vol.26 , Issue.8 , pp. 897-899
  • 9
    • 84941238015 scopus 로고    scopus 로고
    • Indika: Difference between hierarchical and partitional clustering
    • Indika: Difference between hierarchical and partitional clustering. http://www.differencebetween.com/difference-between-hierarchical-and-vs-partitional-clustering (2011)
    • (2011)
  • 11
    • 84941238016 scopus 로고    scopus 로고
    • Jin, R.: Cluster validation
    • Jin, R.: Cluster validation. http://www.cs.kent.edu/~jin/DM08/ClusterValidation.pdf (2008)
    • (2008)
  • 12
    • 84953744816 scopus 로고
    • A statistical interpretation of term specificity and its application in retrieval
    • Jones, K.: A statistical interpretation of term specificity and its application in retrieval. J. Doc. 28(1), 11–21 (1972)
    • (1972) J. Doc. , vol.28 , Issue.1 , pp. 11-21
    • Jones, K.1
  • 13
    • 33845768389 scopus 로고    scopus 로고
    • Learning to detect and classify malicious executables in the wild
    • Kolter, S., Maloof, M.: Learning to detect and classify malicious executables in the wild. J. Mach. Learn. Res. 7, 2721–2744 (2006)
    • (2006) J. Mach. Learn. Res. , vol.7 , pp. 2721-2744
    • Kolter, S.1    Maloof, M.2
  • 15
    • 0028181441 scopus 로고
    • Hidden Markov models in computational biology: applications to protein modeling
    • Krogh, A., et al.: Hidden Markov models in computational biology: applications to protein modeling. J. Mol. Biol. 235(5), 1501–1531 (1994)
    • (1994) J. Mol. Biol. , vol.235 , Issue.5 , pp. 1501-1531
    • Krogh, A.1
  • 16
    • 84880635362 scopus 로고    scopus 로고
    • VILO: a rapid learning nearest-neighbor classifier for malware triage
    • Lakhotia, A., Walenstein, A., Miles, C., Singh, A.: VILO: a rapid learning nearest-neighbor classifier for malware triage. J. Comput. Virol. 9(3), 109–123 (2013)
    • (2013) J. Comput. Virol. , vol.9 , Issue.3 , pp. 109-123
    • Lakhotia, A.1    Walenstein, A.2    Miles, C.3    Singh, A.4
  • 19
    • 84874567401 scopus 로고    scopus 로고
    • A similarity metric method of obfuscated malware using function-call graph
    • Ming, X., et al.: A similarity metric method of obfuscated malware using function-call graph. J. Comput. Virol. Hacking Tech. 9(1), 35–47 (2013)
    • (2013) J. Comput. Virol. Hacking Tech. , vol.9 , Issue.1 , pp. 35-47
    • Ming, X.1
  • 20
    • 84941238017 scopus 로고    scopus 로고
    • MITRE: Malware attribute enumeration and characterization
    • MITRE: Malware attribute enumeration and characterization. http://maec.mitre.org (2013)
    • (2013)
  • 21
    • 84941238018 scopus 로고    scopus 로고
    • Moore, A.W.: (Formula presented.)-Means and hierarchical clustering
    • Moore, A.W.: $$K$$K-Means and hierarchical clustering. http://www.autonlab.org/tutorials/kmeans11.pdf (2001)
    • (2001)
  • 23
    • 84888873413 scopus 로고    scopus 로고
    • Deriving common malware behavior through graph clustering
    • Park, Y., Reeves, D.S., Stamp, M.: Deriving common malware behavior through graph clustering. Comput. Secur. 39(B), 419–430 (2013)
    • (2013) Comput. Secur. , vol.39 , Issue.B , pp. 419-430
    • Park, Y.1    Reeves, D.S.2    Stamp, M.3
  • 24
    • 0024610919 scopus 로고
    • A tutorial on hidden Markov models and selected applications in speech recognition
    • Rabiner, L.: A tutorial on hidden Markov models and selected applications in speech recognition. Proc. IEEE 77(2), 257–286 (1989)
    • (1989) Proc. IEEE , vol.77 , Issue.2 , pp. 257-286
    • Rabiner, L.1
  • 25
    • 84860621757 scopus 로고    scopus 로고
    • Opcode graph similarity and metamorphic detection
    • Runwal, N., Low, R., Stamp, M.: Opcode graph similarity and metamorphic detection. J. Comput. Virol. 8, 37–52 (2012)
    • (2012) J. Comput. Virol. , vol.8 , pp. 37-52
    • Runwal, N.1    Low, R.2    Stamp, M.3
  • 26
    • 82055176044 scopus 로고    scopus 로고
    • Eigenviruses for metamorphic virus recognition
    • Saleh, M., Mohamed, A., Nabi, A.: Eigenviruses for metamorphic virus recognition. IET Inf. Secur. 5(4), 191–198 (2011)
    • (2011) IET Inf. Secur. , vol.5 , Issue.4 , pp. 191-198
    • Saleh, M.1    Mohamed, A.2    Nabi, A.3
  • 27
    • 84941238019 scopus 로고
    • Skulason, F., Solomon, A., Bontchev, V.: CARO naming scheme
    • Skulason, F., Solomon, A., Bontchev, V.: CARO naming scheme. http://www.caro.org/naming/scheme.html (1991)
    • (1991)
  • 28
    • 80255131297 scopus 로고    scopus 로고
    • Comparing files using structural entropy
    • Sorokin, I.: Comparing files using structural entropy. J. Comput. Virol. 7(4), 259–265 (2011)
    • (2011) J. Comput. Virol. , vol.7 , Issue.4 , pp. 259-265
    • Sorokin, I.1
  • 29
    • 84876448803 scopus 로고    scopus 로고
    • Metamorphic worm that carries its own morphing engine
    • Sridhara, S.M., Stamp, M.: Metamorphic worm that carries its own morphing engine. J. Comput. Virol. Hacking Tech. 9(2), 49–58 (2013)
    • (2013) J. Comput. Virol. Hacking Tech. , vol.9 , Issue.2 , pp. 49-58
    • Sridhara, S.M.1    Stamp, M.2
  • 30
    • 84941238020 scopus 로고    scopus 로고
    • Stamp, M.: A revealing introduction to hidden Markov models
    • Stamp, M.: A revealing introduction to hidden Markov models. http://www.cs.sjsu.edu/faculty/stamp/RUA/HMM.pdf (2012)
    • (2012)
  • 31
    • 84941238021 scopus 로고
    • Swimmer, M.: Response to the proposal for a “C virus” database. ACM SIGSAC Review, vol. 8, pp. 1–5
    • Swimmer, M.: Response to the proposal for a “C virus” database. ACM SIGSAC Review, vol. 8, pp. 1–5. http://www.odysci.com/article/1010112993890087 (1990)
    • (1990)
  • 32
    • 84941238022 scopus 로고    scopus 로고
    • Symantec: Trojan.Zbot
    • Symantec: Trojan.Zbot. http://www.symantec.com/security_response/writeup.jsp?docid=2010-011016-3514-99 (2010)
    • (2010)
  • 33
    • 84941238023 scopus 로고    scopus 로고
    • Symantec Security Response: Trojan.Zeroaccess
    • Symantec Security Response: Trojan.Zeroaccess. http://www.symantec.com/security_response/writeup.jsp?docid=2011-071314-0410-99 (2011)
    • (2011)
  • 34
    • 84941238024 scopus 로고    scopus 로고
    • Virus Removal Services: Beware of FAKE antivirus—Winwebsec
    • Virus Removal Services: Beware of FAKE antivirus—Winwebsec. http://virus.myfirstattempt.com/2012/11/beware-of-fake-anti-virus-winwebsec.html (2012)
    • (2012)
  • 35
    • 84941238025 scopus 로고    scopus 로고
    • VX Heavens
    • VX Heavens. http://vx.netlux.org/ (2013)
    • (2013)
  • 36
    • 33751208937 scopus 로고    scopus 로고
    • Hunting for metamorphic engines
    • Wong, W., Stamp, M.: Hunting for metamorphic engines. J. Comput. Virol. 2(3), 211–229 (2006)
    • (2006) J. Comput. Virol. , vol.2 , Issue.3 , pp. 211-229
    • Wong, W.1    Stamp, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.