Hao et al., 2015 - Google Patents
AutoMal: automatic clustering and signature generation for malwares based on the network flowHao et al., 2015
- Document ID
- 5817682029513038427
- Author
- Hao S
- Wang W
- Lu H
- Ren P
- Publication year
- Publication venue
- Security and Communication Networks
External Links
Snippet
The volume of malwares is growing at an exponential speed nowadays. This huge growth makes it extremely hard to analyse malware manually. Most existing signatures extracting methods are based on string signatures, and string matching is not accurate and time …
- 238000001914 filtration 0 abstract description 16
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
- G06K9/627—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches based on distances between the pattern to be recognised and training or reference patterns
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
- G06K9/6228—Selecting the most significant subset of features
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6279—Classification techniques relating to the number of classes
- G06K9/6284—Single class perspective, e.g. one-against-all classification; Novelty detection; Outlier detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Khraisat et al. | Survey of intrusion detection systems: techniques, datasets and challenges | |
US10686829B2 (en) | Identifying changes in use of user credentials | |
Vinayakumar et al. | Scalable framework for cyber threat situational awareness based on domain name systems data analysis | |
Gaikwad et al. | Intrusion detection system using bagging ensemble method of machine learning | |
Nelms et al. | {ExecScent}: Mining for new {C&C} domains in live networks with adaptive control protocol templates | |
Mohaisen et al. | Unveiling zeus: automated classification of malware samples | |
WO2020036622A1 (en) | System and method for detecting generated domain | |
Balduzzi et al. | Targeted attacks detection with spunge | |
Krishnaveni et al. | Ensemble approach for network threat detection and classification on cloud computing | |
Tong et al. | A method for detecting DGA botnet based on semantic and cluster analysis | |
US20200175158A1 (en) | Method For Detecting Intrusions In An Audit Log | |
Bayoğlu et al. | Graph based signature classes for detecting polymorphic worms via content analysis | |
Concone et al. | Twitter Spam Account Detection by Effective Labeling. | |
Hwang et al. | Semi-supervised based unknown attack detection in EDR environment | |
Vullam et al. | Enhancing Intrusion Detection Systems for Secure E-Commerce Communication Networks | |
Goseva-Popstojanova et al. | Using multiclass machine learning methods to classify malicious behaviors aimed at web systems | |
Mitsuhashi et al. | Detection of DGA-based malware communications from DoH traffic using machine learning analysis | |
Liu et al. | Owleye: An advanced detection system of web attacks based on hmm | |
Kumar et al. | Detection of malware using deep learning techniques | |
Villalba et al. | Advanced payload analyzer preprocessor | |
Hao et al. | AutoMal: automatic clustering and signature generation for malwares based on the network flow | |
Ismail et al. | Incorporating known malware signatures to classify new malware variants in network traffic | |
Chen et al. | Data curation and quality assurance for machine learning-based cyber intrusion detection | |
Patil et al. | Learning to Detect Phishing Web Pages Using Lexical and String Complexity Analysis. | |
Ajmera et al. | A survey report on identifying different machine learning algorithms in detecting domain generation algorithms within enterprise network |