Citation Export
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Taejin | - |
dc.contributor.author | Choi, Bomin | - |
dc.contributor.author | Shin, Youngsang | - |
dc.contributor.author | Kwak, Jin | - |
dc.date.issued | 2018-08-01 | - |
dc.identifier.uri | https://dspace.ajou.ac.kr/dev/handle/2018.oak/29972 | - |
dc.description.abstract | The majority of recent cyber incidents have been caused by malware. According to a report by Symantec, an average of one million malicious codes is found daily. Automated static and dynamic analysis technologies are generally applied to cope with this, but most of the new malicious codes are the mutants of existing malware. In this paper, we present technology that automatically detects the n-gram and clustering coefficient-based malware mutants and that automatically groups the different types of malware. We verified our system by applying more than 2600 malicious codes. Our proposed technology does more than just respond to malware as it can also provide the ground for the effective analysis of new malware, the trend analysis of a malware group, the automatic identification of specific malware, and the analysis of the estimated trend of an attacker. | - |
dc.description.sponsorship | This work was supported by the Institute for Information and communications Technology Promotion(IITP) grant funded by the Korea government (MSIP) (No.R0101-15-0175, The Development of Cyber Attacks Detection Technology based on Mass Security Events Analysing and Malicious Code Profiling). The authors declare that there is no conflict of interests regarding the publication of this paper. | - |
dc.description.sponsorship | Acknowledgements This work was supported by the Institute for Information and communications Technology Promotion(IITP) grant funded by the Korea government (MSIP) (No.R0101-15-0175, The Development of Cyber Attacks Detection Technology based on Mass Security Events Analysing and Malicious Code Profiling). | - |
dc.language.iso | eng | - |
dc.publisher | Springer New York LLC | - |
dc.subject.mesh | Automatic identification | - |
dc.subject.mesh | Clustering coefficient | - |
dc.subject.mesh | Effective analysis | - |
dc.subject.mesh | Group classification | - |
dc.subject.mesh | Malicious codes | - |
dc.subject.mesh | Mutant | - |
dc.subject.mesh | N-grams | - |
dc.subject.mesh | Static and dynamic analysis | - |
dc.title | Automatic malware mutant detection and group classification based on the n-gram and clustering coefficient | - |
dc.type | Article | - |
dc.citation.endPage | 3503 | - |
dc.citation.startPage | 3489 | - |
dc.citation.title | Journal of Supercomputing | - |
dc.citation.volume | 74 | - |
dc.identifier.bibliographicCitation | Journal of Supercomputing, Vol.74, pp.3489-3503 | - |
dc.identifier.doi | 10.1007/s11227-015-1594-6 | - |
dc.identifier.scopusid | 2-s2.0-84950280957 | - |
dc.identifier.url | http://www.springerlink.com/content/0920-8542 | - |
dc.subject.keyword | Clustering coefficient | - |
dc.subject.keyword | Malicious code | - |
dc.subject.keyword | Mutant | - |
dc.subject.keyword | n-Gram | - |
dc.description.isoa | true | - |
dc.subject.subarea | Software | - |
dc.subject.subarea | Theoretical Computer Science | - |
dc.subject.subarea | Information Systems | - |
dc.subject.subarea | Hardware and Architecture | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.