[go: up one dir, main page]

Hao et al., 2015 - Google Patents

AutoMal: automatic clustering and signature generation for malwares based on the network flow

Hao et al., 2015

Document ID
5817682029513038427
Author
Hao S
Wang W
Lu H
Ren P
Publication year
Publication venue
Security and Communication Networks

External Links

Snippet

The volume of malwares is growing at an exponential speed nowadays. This huge growth makes it extremely hard to analyse malware manually. Most existing signatures extracting methods are based on string signatures, and string matching is not accurate and time …
Continue reading at onlinelibrary.wiley.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6268Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
    • G06K9/627Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches based on distances between the pattern to be recognised and training or reference patterns
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • G06K9/6228Selecting the most significant subset of features
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6279Classification techniques relating to the number of classes
    • G06K9/6284Single class perspective, e.g. one-against-all classification; Novelty detection; Outlier detection

Similar Documents

Publication Publication Date Title
Khraisat et al. Survey of intrusion detection systems: techniques, datasets and challenges
US10686829B2 (en) Identifying changes in use of user credentials
Vinayakumar et al. Scalable framework for cyber threat situational awareness based on domain name systems data analysis
Gaikwad et al. Intrusion detection system using bagging ensemble method of machine learning
Nelms et al. {ExecScent}: Mining for new {C&C} domains in live networks with adaptive control protocol templates
Mohaisen et al. Unveiling zeus: automated classification of malware samples
WO2020036622A1 (en) System and method for detecting generated domain
Balduzzi et al. Targeted attacks detection with spunge
Krishnaveni et al. Ensemble approach for network threat detection and classification on cloud computing
Tong et al. A method for detecting DGA botnet based on semantic and cluster analysis
US20200175158A1 (en) Method For Detecting Intrusions In An Audit Log
Bayoğlu et al. Graph based signature classes for detecting polymorphic worms via content analysis
Concone et al. Twitter Spam Account Detection by Effective Labeling.
Hwang et al. Semi-supervised based unknown attack detection in EDR environment
Vullam et al. Enhancing Intrusion Detection Systems for Secure E-Commerce Communication Networks
Goseva-Popstojanova et al. Using multiclass machine learning methods to classify malicious behaviors aimed at web systems
Mitsuhashi et al. Detection of DGA-based malware communications from DoH traffic using machine learning analysis
Liu et al. Owleye: An advanced detection system of web attacks based on hmm
Kumar et al. Detection of malware using deep learning techniques
Villalba et al. Advanced payload analyzer preprocessor
Hao et al. AutoMal: automatic clustering and signature generation for malwares based on the network flow
Ismail et al. Incorporating known malware signatures to classify new malware variants in network traffic
Chen et al. Data curation and quality assurance for machine learning-based cyber intrusion detection
Patil et al. Learning to Detect Phishing Web Pages Using Lexical and String Complexity Analysis.
Ajmera et al. A survey report on identifying different machine learning algorithms in detecting domain generation algorithms within enterprise network