Ajou University repository

Automatic malware mutant detection and group classification based on the n-gram and clustering coefficientoa mark
  • Lee, Taejin ;
  • Choi, Bomin ;
  • Shin, Youngsang ;
  • Kwak, Jin
Citations

SCOPUS

0

Citation Export

DC Field Value Language
dc.contributor.authorLee, Taejin-
dc.contributor.authorChoi, Bomin-
dc.contributor.authorShin, Youngsang-
dc.contributor.authorKwak, Jin-
dc.date.issued2018-08-01-
dc.identifier.urihttps://dspace.ajou.ac.kr/dev/handle/2018.oak/29972-
dc.description.abstractThe majority of recent cyber incidents have been caused by malware. According to a report by Symantec, an average of one million malicious codes is found daily. Automated static and dynamic analysis technologies are generally applied to cope with this, but most of the new malicious codes are the mutants of existing malware. In this paper, we present technology that automatically detects the n-gram and clustering coefficient-based malware mutants and that automatically groups the different types of malware. We verified our system by applying more than 2600 malicious codes. Our proposed technology does more than just respond to malware as it can also provide the ground for the effective analysis of new malware, the trend analysis of a malware group, the automatic identification of specific malware, and the analysis of the estimated trend of an attacker.-
dc.description.sponsorshipThis work was supported by the Institute for Information and communications Technology Promotion(IITP) grant funded by the Korea government (MSIP) (No.R0101-15-0175, The Development of Cyber Attacks Detection Technology based on Mass Security Events Analysing and Malicious Code Profiling). The authors declare that there is no conflict of interests regarding the publication of this paper.-
dc.description.sponsorshipAcknowledgements This work was supported by the Institute for Information and communications Technology Promotion(IITP) grant funded by the Korea government (MSIP) (No.R0101-15-0175, The Development of Cyber Attacks Detection Technology based on Mass Security Events Analysing and Malicious Code Profiling).-
dc.language.isoeng-
dc.publisherSpringer New York LLC-
dc.subject.meshAutomatic identification-
dc.subject.meshClustering coefficient-
dc.subject.meshEffective analysis-
dc.subject.meshGroup classification-
dc.subject.meshMalicious codes-
dc.subject.meshMutant-
dc.subject.meshN-grams-
dc.subject.meshStatic and dynamic analysis-
dc.titleAutomatic malware mutant detection and group classification based on the n-gram and clustering coefficient-
dc.typeArticle-
dc.citation.endPage3503-
dc.citation.startPage3489-
dc.citation.titleJournal of Supercomputing-
dc.citation.volume74-
dc.identifier.bibliographicCitationJournal of Supercomputing, Vol.74, pp.3489-3503-
dc.identifier.doi10.1007/s11227-015-1594-6-
dc.identifier.scopusid2-s2.0-84950280957-
dc.identifier.urlhttp://www.springerlink.com/content/0920-8542-
dc.subject.keywordClustering coefficient-
dc.subject.keywordMalicious code-
dc.subject.keywordMutant-
dc.subject.keywordn-Gram-
dc.description.isoatrue-
dc.subject.subareaSoftware-
dc.subject.subareaTheoretical Computer Science-
dc.subject.subareaInformation Systems-
dc.subject.subareaHardware and Architecture-
Show simple item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

KWAK, JIN Image
KWAK, JIN곽진
Department of Cyber Security
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.