메뉴 건너뛰기




Volumn 2016-October, Issue , 2016, Pages 3901-3908

Application of Deep Belief Networks for opcode based malware detection

Author keywords

DBN; Deep Learning; Deep neural Nets; Malware detection; Security

Indexed keywords

CLASSIFICATION (OF INFORMATION); COMPUTER CRIME; DECISION TREES; INPUT OUTPUT PROGRAMS; LEARNING SYSTEMS; MALWARE; NEAREST NEIGHBOR SEARCH; PATTERN RECOGNITION; SUPPORT VECTOR MACHINES; TREES (MATHEMATICS);

EID: 85007164413     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IJCNN.2016.7727705     Document Type: Conference Paper
Times cited : (55)

References (27)
  • 1
    • 0034269416 scopus 로고    scopus 로고
    • Attacking malicious code: Report to the infosec research council
    • G. McGraw, G. Morrisett, "Attacking malicious code: report to the infosec research council", IEEE Softw, vol. 17, pp. 33-41, 2002.
    • (2002) IEEE Softw , vol.17 , pp. 33-41
    • McGraw, G.1    Morrisett, G.2
  • 2
    • 33748978409 scopus 로고    scopus 로고
    • Malware pattern scanning schemes secure against black box analysis
    • E. Filiol, "Malware pattern scanning schemes secure against black box analysis", J. Comput. Virol, vol. 2, pp. 35-50, 2006.
    • (2006) J. Comput. Virol , vol.2 , pp. 35-50
    • Filiol, E.1
  • 4
    • 84888875986 scopus 로고    scopus 로고
    • Runtime packers: The hidden problem
    • Las Vegas, USA
    • T. Brosch, M. Morgenstern, "Runtime packers: the hidden problem", In Proceedings of Black Hat, Las Vegas, USA, 2006, pp. 325-334.
    • (2006) Proceedings of Black Hat , pp. 325-334
    • Brosch, T.1    Morgenstern, M.2
  • 5
    • 65749099969 scopus 로고    scopus 로고
    • Detection of malicious code by applying machine learning classifiers on static features - A state-of-the-art survey
    • A. Shabtai, R. Moskovitch, Y. Elovici, C. Glezer, "Detection of malicious code by applying machine learning classifiers on static features - a state-of-the-art survey", Information Security Technical Report. vol. 14, pp. 16-29, 2009.
    • (2009) Information Security Technical Report , vol.14 , pp. 16-29
    • Shabtai, A.1    Moskovitch, R.2    Elovici, Y.3    Glezer, C.4
  • 8
    • 80051781512 scopus 로고    scopus 로고
    • Feature representation and selection in malicious code detection methods based on static system calls
    • Y. Ding Y., X. Yuan, D. Zhou, L. Dong, Z. An, "Feature representation and selection in malicious code detection methods based on static system calls", Computers & Security, vol. 30, pp. 514-524, 2011.
    • (2011) Computers & Security , vol.30 , pp. 514-524
    • Ding, Y.Y.1    Yuan, X.2    Zhou, D.3    Dong, L.4    An, Z.5
  • 10
    • 34748865971 scopus 로고    scopus 로고
    • A feature selection and evaluation scheme for computer virus detection
    • Hong Kong
    • O. Henchiri, N. Japkowicz, "A feature selection and evaluation scheme for computer virus detection", In Proceedings of ICDM-2006, Hong Kong; 2006, pp. 891-95.
    • (2006) Proceedings of ICDM-2006 , pp. 891-895
    • Henchiri, O.1    Japkowicz, N.2
  • 16
    • 33745805403 scopus 로고    scopus 로고
    • A fast learning algorithm for deep belief nets
    • G. E. Hinton, S. Osindero, and Y. The, "A fast learning algorithm for deep belief nets", Neural Comput., vol. 18, pp. 1527-1554, 2006.
    • (2006) Neural Comput. , vol.18 , pp. 1527-1554
    • Hinton, G.E.1    Osindero, S.2    The, Y.3
  • 17
    • 77958488310 scopus 로고    scopus 로고
    • Deep machine learning-a new frontier in artificial intelligence research
    • A. Itamar, C. Derek, and P. Thomas, "Deep machine learning-a new frontier in artificial intelligence research", IEEE computational intelligence magazine, vol. 11, pp. 13-18, 2010.
    • (2010) IEEE Computational Intelligence Magazine , vol.11 , pp. 13-18
    • Itamar, A.1    Derek, C.2    Thomas, P.3
  • 18
    • 84902256384 scopus 로고    scopus 로고
    • Control flow-based opcode behavior analysis for malware detection
    • Y. Ding, W. Dai, S. Yan, "Control flow-based opcode behavior analysis for malware detection", Computers & Security, vol. 44, pp. 231:64-82, 2014.
    • (2014) Computers & Security , vol.44 , pp. 23164-23182
    • Ding, Y.1    Dai, W.2    Yan, S.3
  • 19
    • 85007163315 scopus 로고    scopus 로고
    • Accessed 23.3.2010
    • Hex-Rays SA, "IDA pro introduction", Available from: http://www.hexrays.com/products.shtml/ (Accessed 23.3.2010).
    • IDA Pro Introduction
  • 20
    • 85007186373 scopus 로고    scopus 로고
    • Accessed 23.3.2010
    • Peid, "Peid v0.94." Available From: http://www.peid.info/ (Accessed 23.3.2010).
    • Peid v0.94
  • 21
    • 84874105145 scopus 로고    scopus 로고
    • Opcode sequences as representation of executables for data-mining-based unknown malware detection
    • S. Igor, B. Felix, U. P. Xabier, "Opcode sequences as representation of executables for data-mining-based unknown malware detection", Information Science, vol. 231, pp. 64-82, 2013..
    • (2013) Information Science , vol.231 , pp. 64-82
    • Igor, S.1    Felix, B.2    Xabier, U.P.3
  • 22
    • 84890752534 scopus 로고    scopus 로고
    • Malware detection method based on the control-flow construct feature of software
    • Z. Zhao, J. Wang, J. Bai, "Malware detection method based on the control-flow construct feature of software", IET Information Security, vol. 8, pp. 18-24, 2014.
    • (2014) IET Information Security , vol.8 , pp. 18-24
    • Zhao, Z.1    Wang, J.2    Bai, J.3
  • 23
    • 33746600649 scopus 로고    scopus 로고
    • Reducing the dimensionality of data with neural networks
    • July
    • G. Hinton, and R. Salakhutdinov, "Reducing the dimensionality of data with neural networks", Science, vol. 313, pp. 504-507, July 2006.
    • (2006) Science , vol.313 , pp. 504-507
    • Hinton, G.1    Salakhutdinov, R.2
  • 26
    • 0032786569 scopus 로고    scopus 로고
    • Improving support vector machine classifiers by modifying kernel functions
    • S. Amari, S. Wu, "Improving support vector machine classifiers by modifying kernel functions", Neural Networks, Vol. 12, pp. 783-789, 1999.
    • (1999) Neural Networks , vol.12 , pp. 783-789
    • Amari, S.1    Wu, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.