On Malfunction, Mechanisms and Malware Classification
نویسندگان
چکیده
منابع مشابه
On Malware Characterization and Attack Classification
Malware is one of the significant problems in the current Internet. Often security tool vendors develop an attack signature to deal with the attacks. However attack techniques such as polymorphism and metamorphism can be used by the attacker to generate multiple variants of the malware and complicate the signature identification. In this paper we present our analysis on sample set of malware an...
متن کاملMalware Detection using Classification of Variable-Length Sequences
In this paper, a novel method based on the graph is proposed to classify the sequence of variable length as feature extraction. The proposed method overcomes the problems of the traditional graph with variable length of data, without fixing length of sequences, by determining the most frequent instructions and insertion the rest of instructions on the set of “other”, save speed and memory. Acco...
متن کاملMicrosoft Malware Classification Challenge
The Microsoft Malware Classification Challenge was announced in 2015 along with a publication of a huge dataset of nearly 0.5 terabytes, consisting of disassembly and bytecode of more than 20K malware samples. Apart from serving in the Kaggle competition, the dataset has become a standard benchmark for research on modeling malware behaviour. To date, the dataset has been cited in more than 50 r...
متن کاملOn Drive-by-download Attacks and Malware Classification
This paper provides a review and discussion on categorisation of malware and evaluation of techniques used by previous research in classifying malware into families. AI techniques used in previous research together with proposed solutions are discussed; some research questions identified and our future research direction is highlighted. Unsupervised algorithms provide higher speed clustering of...
متن کاملPermission-based Malware Detection Mechanisms on Android: Analysis and Perspectives
Android security has been built upon a permission-based mechanism which restricts accesses of third-party Android applications to critical resources on an Android device. The user must accept the set of permissions an application requires, before proceeding the installation. This process aims to inform the users of the risk of installing and using an application on their device; but most often,...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Philosophy & Technology
سال: 2018
ISSN: 2210-5433,2210-5441
DOI: 10.1007/s13347-018-0334-2