Malicious sequential pattern mining for automatic malware detection
Tóm tắt
Từ khóa
Tài liệu tham khảo
Abdelhamid, 2014, Phishing detection based associative classification data mining, Expert Systems with Applications, 41, 5948, 10.1016/j.eswa.2014.03.019
Ahmadi, M., Giacinto, G., Ulyanov, D., Semenov, S. Trofimov, M. (2015). Novel feature extraction, selection and fusion for effective malware family classification. arXiv: http://arxiv.org/abs/1511.04317.
Ahmadi, 2013, Malware detection by behavioural sequential patterns, Computer Fraud & Security, 2013, 11, 10.1016/S1361-3723(13)70072-1
Austin, 2013, Exploring hidden markov models for virus analysis: a semantic approach, 5039
Bazrafshan, 2013, A survey on heuristic malware detection techniques, 113
Bing, 1998, Integrating classification and association rule mining
C32Asm (2011). https://tuts4you.com/download.php?view.1130. Accessed 22.06.14.
Egele, 2012, A survey on automated dynamic malware-analysis techniques and tools, Computing Surveys, 44, 6, 10.1145/2089125.2089126
Griffin, 2009, Automatic generation of string signatures for malware detection, 101
Guo, 2003, KNN model-based approach in classification, 986
Han, 2006
Hofmeyr, 1998, Intrusion detection using sequences of system calls, Journal of Computer Security, 6, 151, 10.3233/JCS-980109
Jain, 2014, Techniques in detection and analyzing malware executables: A review, International Journal of Computer Science and Mobile Computing, 3, 930
Kephart, 1994, Automatic extraction of computer virus signatures, 178
Lo, 2009, Classification of software behaviors for failure detection: a discriminative pattern mining approach, 557
Narouei, 2015, DLLMiner: Structural mining for malware detection, Security and Communication Networks, 8, 3311, 10.1002/sec.1255
Nissim, 2014, Novel active learning methods for enhanced PC malware detection in windows OS, Expert Systems with Applications, 41, 5843, 10.1016/j.eswa.2014.02.053
Qiao, 2014, CBM: Free, automatic malware analysis framework using API call sequences, 225
Rad, 2012, Opcodes histogram for classifying metamorphic portable executables malware, 209
McAfee Labs (2015). McAfee Labs threats report: May 2015. http://www.mcafee.com/us/resources/reports/rpquarterlythreatq12015.pdf. Accessed 17.12.15.
Runwal, 2012, Opcode graph similarity and metamorphic detection, Journal in Computer Virology, 8, 37, 10.1007/s11416-012-0160-5
Santos, 2010, Idea: Opcode-sequence-based malware detection, 35
Schultz, 2001, Data mining methods for detection of new malicious executables, 36, 38
Shabtai, 2012, Detecting unknown malicious code by applying classification techniques on opcode patterns, Security Informatics, 1, 1, 10.1186/2190-8532-1-1
Shen, 2002, Objective-oriented utility-based association mining, 426
Soucy, 2005, Beyond TFIDF weighting for text categorization in the vector space model, 5, 1130
Srikant, 1996
Sun, 2009, A rough set approach for automatic key attributes identification of zero-day polymorphic worms, Expert Systems with Applications, 36, 4672, 10.1016/j.eswa.2008.06.037
Sundarkumar, 2015, Malware detection via API calls, topic models and machine learning, 1212
Symantec (2015). Symantec intelligent report: October 2015. http://www.symantec.com/content/en/us/enterprise/otherresources/b-intelligencereport102015enus.pdf. Accessed 17.12.15.
Uppal, 2014, Malware detection and classification based on extraction of API sequences, 2337
Wchner, 2014, Malware detection with quantitative data flow graphs, 271
Yang, 1997, A comparative study on feature selection in text categorization, 97, 412
Ye, 2010, Automatic malware categorization using cluster ensemble, 95
Ye, 2008, An intelligent PE-malware detection system based on association mining, Journal in computer virology, 4, 323, 10.1007/s11416-008-0082-4
Zeng, 2009, Pseudo nearest neighbor rule for pattern classification, Expert Systems with Applications, 36, 3587, 10.1016/j.eswa.2008.02.003