메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Scalable, Behavior-Based Malware Clustering

Author keywords

[No Author keywords available]

Indexed keywords

CLUSTERING ALGORITHMS; NETWORK SECURITY;

EID: 85043201839     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (494)

References (46)
  • 1
    • 85180627949 scopus 로고    scopus 로고
    • at
    • ANUBIS. http://anubis.seclab.tuwien.ac. at, 2008.
    • (2008)
  • 3
    • 85180632251 scopus 로고    scopus 로고
    • CWSandbox. http://www.cwsandbox.org/, 2008.
    • (2008) CWSandbox
  • 5
    • 85180623139 scopus 로고    scopus 로고
    • MWCollect. http://www.mwcollect.org/, 2008.
    • (2008) MWCollect
  • 6
    • 85180623675 scopus 로고    scopus 로고
    • Norman Sandbox. http://www.norman.com/microsites/nsic/, 2008.
    • (2008) Norman Sandbox
  • 7
    • 85180636038 scopus 로고    scopus 로고
    • Shadowserver. http://shadowserver.org/wiki/, 2008.
    • (2008)
  • 8
    • 85180633631 scopus 로고    scopus 로고
    • ThreatExpert. http://www.threatexpert.com/, 2008.
    • (2008) ThreatExpert
  • 9
    • 84867731767 scopus 로고    scopus 로고
    • Virus Total. http://www.virustotal.com/, 2008.
    • (2008) Virus Total
  • 23
    • 33750355107 scopus 로고    scopus 로고
    • Minos: Architectural support for software security through control data integrity
    • J. Crandall and F. Chong. Minos: Architectural support for software security through control data integrity. In International Symposium on Microarchitecture, 2004.
    • (2004) International Symposium on Microarchitecture
    • Crandall, J.1    Chong, F.2
  • 29
    • 0031644241 scopus 로고    scopus 로고
    • Approximate nearest neighbors: towards removing the curse of dimensionality
    • P. Indyk and R. Motwani. Approximate nearest neighbors: towards removing the curse of dimensionality. In Proc. of 30th STOC, pages 604–613, 1998.
    • (1998) Proc. of 30th STOC , pp. 604-613
    • Indyk, P.1    Motwani, R.2
  • 30
    • 33845768389 scopus 로고    scopus 로고
    • Learning to detect and classify malicious executables in the wild
    • J. Z. Kolter and M. A. Maloof. Learning to detect and classify malicious executables in the wild. J. Mach. Learn. Res., 7:2721–2744, 2006.
    • (2006) J. Mach. Learn. Res , vol.7 , pp. 2721-2744
    • Kolter, J. Z.1    Maloof, M. A.2
  • 32
    • 51549108952 scopus 로고    scopus 로고
    • SGNET: a worldwide deployable framework to support the analysis of malware threat models
    • May 7-9, Kaunas, Lituania, 2008
    • C. Leita and M. Dacier. SGNET: a worldwide deployable framework to support the analysis of malware threat models. In EDCC 2008, 7th European Dependable Computing Conference, May 7-9, 2008, Kaunas, Lituania, 2008.
    • (2008) EDCC 2008, 7th European Dependable Computing Conference
    • Leita, C.1    Dacier, M.2
  • 38
    • 48649087530 scopus 로고    scopus 로고
    • Limits of Static Analysis for Malware Detection
    • IEEE Computer Society
    • A. Moser, C. Kruegel, and E. Kirda. Limits of Static Analysis for Malware Detection. In ACSAC, pages 421–430. IEEE Computer Society, 2007.
    • (2007) ACSAC , pp. 421-430
    • Moser, A.1    Kruegel, C.2    Kirda, E.3
  • 39
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In 12th Annual Network and Distributed System Security Symposium (NDSS), 2005.
    • (2005) 12th Annual Network and Distributed System Security Symposium (NDSS)
    • Newsome, J.1    Song, D.2
  • 40
    • 0033295259 scopus 로고    scopus 로고
    • Bro: a system for detecting network intruders in real-time
    • V. Paxson. Bro: a system for detecting network intruders in real-time. Comput. Networks, 31(23-24):2435–2463, 1999.
    • (1999) Comput. Networks , vol.31 , Issue.23-24 , pp. 2435-2463
    • Paxson, V.1
  • 42
    • 3042581533 scopus 로고    scopus 로고
    • Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA
    • L. Spitzner. Honeypots: Tracking Hackers. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 2002.
    • (2002) Honeypots: Tracking Hackers
    • Spitzner, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.