Malicious sequential pattern mining for automatic malware detection

Expert Systems with Applications - Tập 52 - Trang 16-25 - 2016
Yujie Fan1, Yanfang Ye2, Lifei Chen3,1
1School of Mathematics and Computer Science, Fujian Normal University, Fuzhou, China
2Department of Computer Science and Electrical Engineering, West Virginia University, Morgantown, USA
3Department of Computer Science, University of Sherbrooke, Sherbrooke, Canada

Tóm tắt

Từ khóa


Tài liệu tham khảo

Abdelhamid, 2014, Phishing detection based associative classification data mining, Expert Systems with Applications, 41, 5948, 10.1016/j.eswa.2014.03.019

Ahmadi, M., Giacinto, G., Ulyanov, D., Semenov, S. Trofimov, M. (2015). Novel feature extraction, selection and fusion for effective malware family classification. arXiv: http://arxiv.org/abs/1511.04317.

Ahmadi, 2013, Malware detection by behavioural sequential patterns, Computer Fraud & Security, 2013, 11, 10.1016/S1361-3723(13)70072-1

Austin, 2013, Exploring hidden markov models for virus analysis: a semantic approach, 5039

Bazrafshan, 2013, A survey on heuristic malware detection techniques, 113

Bing, 1998, Integrating classification and association rule mining

C32Asm (2011). https://tuts4you.com/download.php?view.1130. Accessed 22.06.14.

Egele, 2012, A survey on automated dynamic malware-analysis techniques and tools, Computing Surveys, 44, 6, 10.1145/2089125.2089126

Griffin, 2009, Automatic generation of string signatures for malware detection, 101

Guo, 2003, KNN model-based approach in classification, 986

Han, 2006

Hofmeyr, 1998, Intrusion detection using sequences of system calls, Journal of Computer Security, 6, 151, 10.3233/JCS-980109

Jain, 2014, Techniques in detection and analyzing malware executables: A review, International Journal of Computer Science and Mobile Computing, 3, 930

Kephart, 1994, Automatic extraction of computer virus signatures, 178

Lo, 2009, Classification of software behaviors for failure detection: a discriminative pattern mining approach, 557

Narouei, 2015, DLLMiner: Structural mining for malware detection, Security and Communication Networks, 8, 3311, 10.1002/sec.1255

Nissim, 2014, Novel active learning methods for enhanced PC malware detection in windows OS, Expert Systems with Applications, 41, 5843, 10.1016/j.eswa.2014.02.053

Qiao, 2014, CBM: Free, automatic malware analysis framework using API call sequences, 225

Rad, 2012, Opcodes histogram for classifying metamorphic portable executables malware, 209

McAfee Labs (2015). McAfee Labs threats report: May 2015. http://www.mcafee.com/us/resources/reports/rpquarterlythreatq12015.pdf. Accessed 17.12.15.

Runwal, 2012, Opcode graph similarity and metamorphic detection, Journal in Computer Virology, 8, 37, 10.1007/s11416-012-0160-5

Santos, 2010, Idea: Opcode-sequence-based malware detection, 35

Schultz, 2001, Data mining methods for detection of new malicious executables, 36, 38

Shabtai, 2012, Detecting unknown malicious code by applying classification techniques on opcode patterns, Security Informatics, 1, 1, 10.1186/2190-8532-1-1

Shen, 2002, Objective-oriented utility-based association mining, 426

Soucy, 2005, Beyond TFIDF weighting for text categorization in the vector space model, 5, 1130

Srikant, 1996

Sun, 2009, A rough set approach for automatic key attributes identification of zero-day polymorphic worms, Expert Systems with Applications, 36, 4672, 10.1016/j.eswa.2008.06.037

Sundarkumar, 2015, Malware detection via API calls, topic models and machine learning, 1212

Symantec (2015). Symantec intelligent report: October 2015. http://www.symantec.com/content/en/us/enterprise/otherresources/b-intelligencereport102015enus.pdf. Accessed 17.12.15.

Uppal, 2014, Malware detection and classification based on extraction of API sequences, 2337

Wchner, 2014, Malware detection with quantitative data flow graphs, 271

Yang, 1997, A comparative study on feature selection in text categorization, 97, 412

Ye, 2010, Automatic malware categorization using cluster ensemble, 95

Ye, 2008, An intelligent PE-malware detection system based on association mining, Journal in computer virology, 4, 323, 10.1007/s11416-008-0082-4

Zeng, 2009, Pseudo nearest neighbor rule for pattern classification, Expert Systems with Applications, 36, 3587, 10.1016/j.eswa.2008.02.003

Zhang, 2012, Hierarchical feature selection method for detection of obfuscated malicious code, Journal of Computer Applications, 32, 2761, 10.3724/SP.J.1087.2012.02761