메뉴 건너뛰기




Volumn , Issue , 2015, Pages

Analysis of Malware behavior: Type classification using machine learning

Author keywords

API call; Cuckoo sandbox; dynamic analysis; feature selection; Malware; Random Forests; scalability; supervised machine learning; type classification

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER CRIME; DECISION TREES; DYNAMIC ANALYSIS; FEATURE EXTRACTION; LEARNING SYSTEMS; SCALABILITY; SUPERVISED LEARNING;

EID: 84963741993     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CyberSA.2015.7166115     Document Type: Conference Paper
Times cited : (108)

References (16)
  • 1
    • 84963722009 scopus 로고    scopus 로고
    • Avast Internet [Feb. 22, 2015].
    • Avast. "Avast 2015." Internet: https://www.avast.com, 2015 [Feb. 22, 2015].
    • (2015) Avast 2015
  • 2
    • 85047039272 scopus 로고    scopus 로고
    • AV-test Malware [Feb. 22 2015]
    • AV-test, Malware, 2014. The Independent IT-Security Institute 2014. http://www.av-test.org/en/statistics/malware/[Feb. 22, 2015].
    • (2014) The Independent IT-Security Institute 2014
  • 4
    • 84963757459 scopus 로고    scopus 로고
    • Cuckoo Foundation [Feb. 22 2015]
    • Cuckoo Foundation. "Automated Malware Analysis-Cuckoo Sandbox." Internet: http://www.cuckoosandbox.org/, 2014 [Feb. 22, 2015].
    • (2014) Automated Malware Analysis-Cuckoo Sandbox
  • 7
    • 0041382385 scopus 로고    scopus 로고
    • Jan. [Feb. 22 2015]
    • L. Breiman. (2001, Jan.). Random Forests. [Online]. Available:http://oz. berkeley.edu/-breiman/randomforest2001 [Feb. 22, 2015].
    • (2001) Random Forests
    • Breiman, L.1
  • 8
    • 84963760222 scopus 로고    scopus 로고
    • Towards understanding malware behaviour by the extraction of API calls
    • Australia: IEEE
    • M. Alazab, S. Venkataraman and P. Watters, Towards Understanding Malware Behaviour by the Extraction of API calls, 2nd CTC 2010 Ballarat (VIC), Australia: IEEE, 2012.
    • (2012) 2nd CTC 2010 Ballarat (VIC)
    • Alazab, M.1    Venkataraman, S.2    Watters, P.3
  • 9
    • 84963762908 scopus 로고    scopus 로고
    • Dec. 20 [Feb. 22 2015]
    • M. Platts. "The Network Connection Status Icon." Internet: http://blogs.technet.com/b/networking/archive/2012/12/20/the-network-connection-status-icon.aspx, Dec. 20, 2012 [Feb. 22, 2015].
    • (2012) The Network Connection Status Icon
    • Platts, M.1
  • 13
    • 84963749487 scopus 로고    scopus 로고
    • VirusShare
    • Internet: Feb. 22 [Feb. 22 2015]
    • VirusShare. "VirusShare.com-Because Sharing is Caring." Internet: http://virusshare.com/, Feb. 22, 2015 [Feb. 22, 2015].
    • (2015) VirusShare.com-Because Sharing Is Caring
  • 14
    • 84941178458 scopus 로고    scopus 로고
    • VirusTotal Internet: [Feb. 22 2015]
    • VirusTotal. "virustotal." Internet: https://www.virustotal.com/, 2015 [Feb. 22, 2015].
    • (2015) Virustotal
  • 15
    • 11244260106 scopus 로고    scopus 로고
    • WEKA Internet: [Feb. 22 2015]
    • WEKA. "Weka 3: Data Mining Software in Java." Internet: http://www. cs.waikato.ac.nz/ml/weka/, 2014 [Feb. 22, 2015].
    • (2014) Weka 3: Data Mining Software in Java
  • 16
    • 84869184774 scopus 로고    scopus 로고
    • A miner for malware detection based on api function calls and their arguments
    • Z. Selehi, M. Ghiasi and A. Sami, A miner for malware detection based on api function calls and their arguments, 16th AISP 2012 Shiraz, Fars: IEEE, 2012.
    • (2012) 16th AISP 2012 Shiraz, Fars: IEEE
    • Selehi, Z.1    Ghiasi, M.2    Sami, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.