메뉴 건너뛰기




Volumn 52, Issue , 2016, Pages 16-25

Malicious sequential pattern mining for automatic malware detection

Author keywords

Classification; Instruction sequence; Malware detection; Sequential pattern mining

Indexed keywords

ALGORITHMS; CLASSIFICATION (OF INFORMATION); COMPUTER CRIME; COMPUTER VIRUSES; COMPUTER WORMS; DAMAGE DETECTION; DATA MINING; NEAREST NEIGHBOR SEARCH; PATTERN RECOGNITION; VIRUSES;

EID: 84961351749     PISSN: 09574174     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.eswa.2016.01.002     Document Type: Article
Times cited : (146)

References (37)
  • 1
  • 7
    • 84961342029 scopus 로고    scopus 로고
    • Accessed 22.06.14
    • C32Asm (2011). https://tuts4you.com/download.php?view.1130. Accessed 22.06.14.
    • (2011) C32Asm
  • 8
    • 84858392040 scopus 로고    scopus 로고
    • A survey on automated dynamic malware-analysis techniques and tools
    • Egele M., Scholte T., Kirda E., and Kruegel C. A survey on automated dynamic malware-analysis techniques and tools Computing Surveys 44 2012 6
    • (2012) Computing Surveys , vol.44 , pp. 6
    • Egele, M.1    Scholte, T.2    Kirda, E.3    Kruegel, C.4
  • 18
    • 84888392996 scopus 로고    scopus 로고
    • CBM: Free, automatic malware analysis framework using API call sequences
    • Springer
    • Qiao Y., Yang Y., He J., Tang C., and Liu Z. CBM: Free, automatic malware analysis framework using API call sequences Knowledge engineering and management 2014 Springer 225 236
    • (2014) Knowledge Engineering and Management , pp. 225-236
    • Qiao, Y.1    Yang, Y.2    He, J.3    Tang, C.4    Liu, Z.5
  • 24
    • 84872176999 scopus 로고    scopus 로고
    • Detecting unknown malicious code by applying classification techniques on opcode patterns
    • Shabtai A., Moskovitch R., Feher C., Dolev S., and Elovici Y. Detecting unknown malicious code by applying classification techniques on opcode patterns Security Informatics 1 2012 1 22
    • (2012) Security Informatics , vol.1 , pp. 1-22
    • Shabtai, A.1    Moskovitch, R.2    Feher, C.3    Dolev, S.4    Elovici, Y.5
  • 28
    • 58349117882 scopus 로고    scopus 로고
    • A rough set approach for automatic key attributes identification of zero-day polymorphic worms
    • Sun W.C., and Chen Y.M. A rough set approach for automatic key attributes identification of zero-day polymorphic worms Expert Systems with Applications 36 2009 4672 4679
    • (2009) Expert Systems with Applications , vol.36 , pp. 4672-4679
    • Sun, W.C.1    Chen, Y.M.2
  • 30
    • 84961334857 scopus 로고    scopus 로고
    • Accessed 17.12.15
    • Symantec (2015). Symantec intelligent report: October 2015. http://www.symantec.com/content/en/us/enterprise/otherresources/b-intelligencereport102015enus.pdf. Accessed 17.12.15.
    • (2015) Symantec Intelligent Report: October 2015
  • 35
    • 54849412646 scopus 로고    scopus 로고
    • An intelligent PE-malware detection system based on association mining
    • Ye Y., Wang D., Li T., Ye D., and Jiang Q. An intelligent PE-malware detection system based on association mining Journal in computer virology 4 2008 323 334
    • (2008) Journal in Computer Virology , vol.4 , pp. 323-334
    • Ye, Y.1    Wang, D.2    Li, T.3    Ye, D.4    Jiang, Q.5
  • 36
    • 56349098670 scopus 로고    scopus 로고
    • Pseudo nearest neighbor rule for pattern classification
    • Zeng Y., Yang Y., and Zhao L. Pseudo nearest neighbor rule for pattern classification Expert Systems with Applications 36 2009 3587 3595
    • (2009) Expert Systems with Applications , vol.36 , pp. 3587-3595
    • Zeng, Y.1    Yang, Y.2    Zhao, L.3
  • 37
    • 84961312915 scopus 로고    scopus 로고
    • Hierarchical feature selection method for detection of obfuscated malicious code
    • Zhang J.F., Chen L.F., and Guo G.D. Hierarchical feature selection method for detection of obfuscated malicious code Journal of Computer Applications 32 2012 2761 2767
    • (2012) Journal of Computer Applications , vol.32 , pp. 2761-2767
    • Zhang, J.F.1    Chen, L.F.2    Guo, G.D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.