박사

A Learning-based Static Malware Detection System with Integrated Feature Selection = 러닝 기반의 통합 특징 선정을 지원하는 정적 맬웨어 탐지 시스템

진치국 2019년
논문상세정보
' A Learning-based Static Malware Detection System with Integrated Feature Selection = 러닝 기반의 통합 특징 선정을 지원하는 정적 맬웨어 탐지 시스템' 의 주제별 논문영향력
논문영향력 선정 방법
논문영향력 요약
주제
  • Computer security
  • Machine Learning
  • Malware Detection
  • pca(principal component analysis)
  • static analysis
동일주제 총논문수 논문피인용 총횟수 주제별 논문영향력의 평균
1,510 0

0.0%

' A Learning-based Static Malware Detection System with Integrated Feature Selection = 러닝 기반의 통합 특징 선정을 지원하는 정적 맬웨어 탐지 시스템' 의 참고문헌

  • “VirusShare”, http://virusshare.com/, (2018.08)
  • “Bias and Variance”, 02 December 2017, http://www.ebc.cat/2017/02/12/bias-andvariance/, (2018.09)
  • scikit-learn, “scikit-learn Machine Learning in Python”, http://scikitlearn. org/stable/, (2018.02)
  • Zhao, Lu, Ho-Seok Kang, and Sung-Ryul Kim. "Improved clustering for intrusion detection by principal component analysis with effective noise reduction." Information and Communication Technology-EurAsia Conference. Springer, Berlin, Heidelberg, pp. 490-495, 2013.
  • Yonts, Joel. "Attributes of malicious files." SANS Institute InfoSec Reading Room, 2012.
  • Ye, Yanfang, et al. "IMDS: Intelligent malware detection system." Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, pp. 1043-1047, 2007.
  • Wikipedia, “Taylor series”, https://en.wikipedia.org/wiki/Taylor_series, (2018.04)
  • Weka. “Weka 3: Data Mining Software in Java”, https://www.cs.waikato.ac.nz/ml/weka/, (2018.09)
  • Weber, Michael, et al. "A toolkit for detecting and analyzing malicious software." null. IEEE, pp.423, 2002.
  • Walenstein, Andrew, Daniel J. Hefner, and Jeffery Wichers. "Header information in malware families and impact on automated classifiers." Malicious and Unwanted Software (MALWARE), 2010 5th International Conference on. IEEE, pp. 15-22, 2010.
  • W3Schools, “OS platform statistics,” http://www.w3schools.com/browsers/browsers_os.asp. (2018.10)
  • Virustotal , “API Scripts”, Available in: https://support.virustotal.com/hc/enus/ articles/115002146469-API-scripts, (2018.08)
  • Trinius, Philipp, et al. "A malware instruction set for behavior-based analysis.” 2009.
  • Toderici, Annie H., and Mark Stamp. "Chi-squared distance and metamorphic virus detection." Journal of Computer Virology and Hacking Techniques, vol.9, no.1, pp.1-14, 2013.
  • Tian, Ronghua, et al. "Differentiating malware from cleanware using behavioural analysis." Malicious and Unwanted Software (MALWARE), 2010 5th International Conference on. IEEE, pp. 23-30, 2010.
  • Stehman, Stephen V. "Selecting and interpreting measures of thematic classification accuracy." Remote sensing of Environment, vol.62, no.1, pp. 77-89, 2016.
  • Sorokin, Ivan. "Comparing files using structural entropy." Journal in computer virology, pp. 259–265, 2011.
  • Singh, Abhishek, and Zheng Bu. "Hot knives through butter: Evading file-based sandboxes." Threat Research Blog, 2013.
  • Siddiqui, Muazzam, Morgan C. Wang, and Joohan Lee. "Data Mining Methods For Malware Detection Using Instruction Sequences.”, 2008.
  • Shabtai, Asaf, et al. "Detecting unknown malicious code by applying classification techniques on opcode patterns." Security Informatics, vol.1, no.1, 2012.
  • Schultz, Matthew G., et al. "Data mining methods for detection of new malicious executables." Security and Privacy, 2001. S&P 2001. Proceedings. 2001 IEEE Symposium on. IEEE, pp. 38-49, 2001.
  • Saxe, Joshua, and Konstantin Berlin. "Deep neural network based malware detection using two dimensional binary program features." Malicious and Unwanted Software (MALWARE), 2015 10th International Conference on. IEEE, 2015.
  • Sathyanarayan, V. Sai, Pankaj Kohli, and Bezawada Bruhadeshwar. "Signature generation and detection of malware families." Australasian Conference on Information Security and Privacy. Springer, Berlin, Heidelberg, pp. 336-349, 2008.
  • Santos, Igor, et al. "Opcode sequences as representation of executables for datamining- based unknown malware detection." Information Sciences, vol.231, pp.64-82, 2013.
  • Santos, Igor, et al. "Idea: Opcode-sequence-based malware detection." International Symposium on Engineering Secure Software and Systems. Springer, Berlin, Heidelberg, pp. 35-43, 2010.
  • Sami, Ashkan, et al. "Malware detection based on mining API calls." Proceedings of the 2010 ACM symposium on applied computing. ACM, pp. 1020-1025, 2010.
  • Salehi, Zahra, Mahboobeh Ghiasi, and Ashkan Sami. "A miner for malware detection based on API function calls and their arguments." Artificial Intelligence and Signal Processing (AISP), 2012 16th CSI International Symposium on. IEEE, pp. 563-568, 2012.
  • Salehi, Zahra, Ashkan Sami, and Mahboobe Ghiasi. "MAAR: Robust features to detect malicious activity based on API calls, their arguments and return values." Engineering Applications of Artificial Intelligence, vol.59, pp.93-102, 2017.
  • Safavian, S. Rasoul, and David Landgrebe. "A survey of decision tree classifier methodology." IEEE transactions on systems, man, and cybernetics, vol.21, no.3, pp.660-674. 1991.
  • Runwal, Neha, Richard M. Low, and Mark Stamp. "Opcode graph similarity and metamorphic detection." Journal in Computer Virology, vol.8, no.1-2, pp.37-52, 2012.
  • Rieck, Konrad, et al. "Learning and classification of malware behavior." International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, Berlin, Heidelberg, pp.108-125, 2008.
  • Rieck, Konrad, et al. "Automatic analysis of malware behavior using machine learning." Journal of Computer Security, vol.19, no.4, pp.639-668, 2016.
  • Reddy, D. Krishna Sandeep, and Arun K. Pujari. "N-gram analysis for computer virus detection." Journal in Computer Virology, vol.2, no.3, pp.231-239, 2006.
  • Rad, Babak Bashari, Maslin Masrom, and Suahimi Ibrahim. "Opcodes histogram for classifying metamorphic portable executables malware." e-Learning and e- Technologies in Education (ICEEE), 2012 International Conference on. IEEE, pp. 209-213, 2012.
  • Qiao, Yong, et al. "CBM: free, automatic malware analysis framework using API call sequences." Knowledge engineering and management. Springer, Berlin, Heidelberg, pp.225-236, 2014.
  • Pietrek, Matt. "Inside windows-an in-depth look into the Win32 portable executable file format." MSDN magazine, vol.17, no.2, 2002.
  • Peterson, Leif E. "K-nearest neighbor." Scholarpedia, vol.4, no.2, 1883.
  • Peng, Hanchuan, Fuhui Long, and Chris Ding. "Feature selection based on mutual information criteria of max-dependency, max-relevance, and minredundancy." IEEE Transactions on pattern analysis and machine intelligence, vol.27, no.8, pp.1226-1238, 2005.
  • Peisert, Sean, et al. "Analysis of computer intrusions using sequences of function calls." IEEE Transactions on dependable and secure computing, vol.4, no.2, pp. 137-150, 2007.
  • Nan Zhu and Tianqi Chen, “XGBoost: Implementing the Winningest Kaggle Algorithm in Spark and Flink”, https://www.kdnuggets.com/2016/03/xgboostimplementing- winningest-kaggle-algorithm-spark-flink.html, (2018.03)
  • Moskovitch, Robert, et al. "Unknown malcode detection using opcode representation." Intelligence and Security Informatics. Springer, Berlin, Heidelberg, pp.204-215, 2008.
  • Mongodb, “MongoDB Tutorial”, https://www.tutorialspoint.com/mongodb/, (2018.08)
  • Markel, Zane, and Michael Bilzor. "Building a machine learning classifier for malware detection." Anti-malware Testing Research (WATeR), 2014 Second Workshop on. IEEE, pp.1-4, 2014.
  • Markel, Zane A. Machine learning based malware detection. No. USNA-TSPR- 440. NAVAL ACADEMY ANNAPOLIS MD, 2015.
  • Lee, Taejin, et al. "Automatic malware mutant detection and group classification based on the n-gram and clustering coefficient." The Journal of Supercomputing, vol.74, no.8, pp.3489–3503, 2018.
  • Lakhotia, Arun, et al. "VILO: a rapid learning nearest-neighbor classifier for malware triage." Journal of Computer Virology and Hacking Techniques, vol.9, no.3, pp.109-123, 2013.
  • Kumar, Ajit, K. S. Kuppusamy, and G. Aghila. "A learning model to detect maliciousness of portable executable using integrated feature set." Journal of King Saud University-Computer and Information Sciences, 2017.
  • Kris Kendall and Chad McMillan, “Practical Malware Analysis”, https://www.blackhat.com/presentations/bh-dc- 07/Kendall_McMillan/Presentation/bh-dc-07-Kendall_McMillan.pdf, (2018.05)
  • Kotsiantis, S. B., Dimitris Kanellopoulos, and P. E. Pintelas. "Data preprocessing for supervised leaning." International Journal of Computer Science, vol.1, no.2, pp.111-117, 2006.
  • Khammas, Ban Mohammed, et al. "Feature selection and machine learning classification for malware detection." Jurnal Teknologi, vol.77, no.1, 2015.
  • Karegowda, Asha Gowda, A. S. Manjunath, and M. A. Jayaram. "Comparative study of attribute selection using gain ratio and correlation based feature selection." International Journal of Information Technology and Knowledge Management, vol.1, no.2, pp.271-277, 2010.
  • Kaggle, “XGBoost” , August 2018, https://www.kaggle.com/dansbecker/xgboost, (2018.09)
  • Kaggle, “Microsoft Malware Classification Challenge (BIG 2015)”, https://www.kaggle.com/c/malware-classification, (2018.10)
  • Imran, Mohammad. Evaluation of Hidden Markov Model for Malware Behavioral Classification. Diss. CAPITAL UNIVERSITY, 2016.
  • Idika, Nwokedi, and Aditya P. Mathur. "A survey of malware detection techniques." Purdue University 48, 2007.
  • Hall, Mark Andrew. "Correlation-based feature selection for machine learning.", 1999.
  • GitHub, “pefile”, 22 October 2018, https://github.com/erocarrera/pefile, (2018.09)
  • GitHub, “distorm”, 03 December 2018, https://github.com/gdabah/distorm, (2018.10)
  • Gibert, Daniel. Convolutional neural networks for malware classification. Diss. MS Thesis, Dept. of Computer Science, UPC, 2016.
  • Gandotra, Ekta, Divya Bansal, and Sanjeev Sofat. "Malware analysis and classification: A survey." Journal of Information Security, vol.5, no.2, pp.56-64, 2014.
  • Fu, Jianwen, et al. "Malware Visualization for Fine-Grained Classification." IEEE ACCESS, pp.14510-14523, 2018.
  • Friedman, Jerome H. "Stochastic gradient boosting." Computational Statistics & Data Analysis , vol.38, no.4, pp.367-378, 2002.
  • Friedman, Jerome H. "Greedy function approximation: a gradient boosting machine." Annals of statistics, pp.1189-1232, 2001.
  • Firdausi, Ivan, Alva Erwin, and Anto Satriyo Nugroho. "Analysis of machine learning techniques used in behavior-based malware detection." Advances in Computing, Control and Telecommunication Technologies (ACT), 2010 Second International Conference on. IEEE, pp. 201-203, 2010.
  • Fan, Yujie, Yanfang Ye, and Lifei Chen. "Malicious sequential pattern mining for automatic malware detection." Expert Systems with Applications, vol.52, pp.16-25, 2016.
  • Eskandari, Mojtaba, and Sattar Hashemi. "Metamorphic malware detection using control flow graph mining." Int. J. Comput. Sci. Network Secur, vol.11, no.12, pp. 1-6, 2011.
  • El Boujnouni, Mohamed, Mohamed Jedra, and Noureddine Zahid. "New malware detection framework based on N-grams and support vector domain description." Information Assurance and Security (IAS), 2015 11th International Conference on. IEEE, pp.123-128, 2015.
  • Ding, Yuxin, et al. "A fast malware detection algorithm based on objectiveoriented association mining." computers & security, vol.39, pp.315-324, 2013.
  • Chowdhury, Gobinda G. Introduction to modern information retrieval. Facet publishing, 2010.
  • Chen, Zhi-Guo, et al. "Automatic Ransomware Detection and Analysis Based on Dynamic API Calls Flow Graph." Proceedings of the International Conference on Research in Adaptive and Convergent Systems. ACM, pp.196-201, 2017.
  • Chen, Tianqi, and Carlos Guestrin. "Xgboost: A scalable tree boosting system." Proceedings of the 22nd acm sigkdd international conference on knowledge discovery and data mining. ACM, pp. 785-794, 2016.
  • Bilar, Daniel. "Opcodes as predictor for malware." International journal of electronic security and digital forensics, vol.1, no.2, pp.156-168, 2007.
  • Benign software, “Most popular software for Windows”, https://software.informer.com/software/, (2018.08)
  • Belaoued, Mohamed, and Smaine Mazouzi. "Statistical Study of imported APIs by PE type malware." Advanced Networking Distributed Systems and Applications (INDS), 2014 International Conference on. IEEE, pp. 82-86, 2014.
  • Belaoued, Mohamed, and Smaine Mazouzi. "A Chi-Square-Based Decision for Real-Time Malware Detection Using PE-File Features." Journal of Information Processing Systems, vol.12, no.4, pp.644-660, 2016.
  • Bazrafshan, Zahra, et al. "A survey on heuristic malware detection techniques." Information and Knowledge Technology (IKT), 2013 5th Conference on. IEEE, pp.113-120, 2013.
  • Baysa, Donabelle, Richard M. Low, and Mark Stamp. "Structural entropy and metamorphic malware." Journal of computer virology and hacking techniques, vol.9, no.4, pp.179-192, 2013.
  • Baldangombo, Usukhbayar, Nyamjav Jambaljav, and Shi-Jinn Horng. "A static malware detection system using data mining methods." arXiv preprint arXiv: 1308.2831 , 2013.
  • Bai, Jinrong, Junfeng Wang, and Guozhong Zou. "A malware detection scheme based on mining format information." The Scientific World Journal 2014, 2014.
  • Ahmadi, Mansour, et al. "Novel feature extraction, selection and fusion for effective malware family classification." Proceedings of the sixth ACM conference on data and application security and privacy. ACM, pp. 183-194, 2016.
  • API Monitor, “Spy and display API calls made by win32 applications”, https://www.apimonitor.com/, (2018.09)