Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Malware family“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Malware family" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Malware family"
Yan, Jinpei, Yong Qi und Qifan Rao. „Detecting Malware with an Ensemble Method Based on Deep Neural Network“. Security and Communication Networks 2018 (2018): 1–16. http://dx.doi.org/10.1155/2018/7247095.
Der volle Inhalt der QuelleJiao, Jian, Qiyuan Liu, Xin Chen und Hongsheng Cao. „Behavior Intention Derivation of Android Malware Using Ontology Inference“. Journal of Electrical and Computer Engineering 2018 (2018): 1–13. http://dx.doi.org/10.1155/2018/9250297.
Der volle Inhalt der QuellePrima, B., und M. Bouhorma. „USING TRANSFER LEARNING FOR MALWARE CLASSIFICATION“. ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLIV-4/W3-2020 (23.11.2020): 343–49. http://dx.doi.org/10.5194/isprs-archives-xliv-4-w3-2020-343-2020.
Der volle Inhalt der QuelleJang, Jae-wook, und Huy Kang Kim. „Function-Oriented Mobile Malware Analysis as First Aid“. Mobile Information Systems 2016 (2016): 1–11. http://dx.doi.org/10.1155/2016/6707524.
Der volle Inhalt der QuelleWang, Changguang, Ziqiu Zhao, Fangwei Wang und Qingru Li. „A Novel Malware Detection and Family Classification Scheme for IoT Based on DEAM and DenseNet“. Security and Communication Networks 2021 (05.01.2021): 1–16. http://dx.doi.org/10.1155/2021/6658842.
Der volle Inhalt der QuelleAbuthawabeh, Mohammad, und Khaled Mahmoud. „Enhanced Android Malware Detection and Family Classification, using Conversation-level Network Traffic Features“. International Arab Journal of Information Technology 17, Nr. 4A (31.07.2020): 607–14. http://dx.doi.org/10.34028/iajit/17/4a/4.
Der volle Inhalt der QuelleCheng, Binlin, Jinjun Liu, Jiejie Chen, Shudong Shi, Xufu Peng, Xingwen Zhang und Haiqing Hai. „MoG: Behavior-Obfuscation Resistance Malware Detection“. Computer Journal 62, Nr. 12 (04.06.2019): 1734–47. http://dx.doi.org/10.1093/comjnl/bxz033.
Der volle Inhalt der QuelleShao, Ke, Qiang Xiong und Zhiming Cai. „FB2Droid: A Novel Malware Family-Based Bagging Algorithm for Android Malware Detection“. Security and Communication Networks 2021 (19.06.2021): 1–13. http://dx.doi.org/10.1155/2021/6642252.
Der volle Inhalt der QuelleAlswaina, Fahad, und Khaled Elleithy. „Android Malware Family Classification and Analysis: Current Status and Future Directions“. Electronics 9, Nr. 6 (05.06.2020): 942. http://dx.doi.org/10.3390/electronics9060942.
Der volle Inhalt der QuelleCheng, Binlin, Qiang Tong, Jianhong Wang und Wenhui Tian. „Malware Clustering Using Family Dependency Graph“. IEEE Access 7 (2019): 72267–72. http://dx.doi.org/10.1109/access.2019.2914031.
Der volle Inhalt der QuelleDissertationen zum Thema "Malware family"
Varga, Adam. „Identifikace a charakterizace škodlivého chování v grafech chování“. Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442388.
Der volle Inhalt der QuelleLiu, Chi-Feng, und 劉其峰. „Malware Family Characterization“. Thesis, 2018. http://ndltd.ncl.edu.tw/handle/4m43xu.
Der volle Inhalt der Quelle國立政治大學
資訊管理學系
106
Nowadays, a massive amount of sensitive data which are accessible and connected through personal computers and cloud services attracts hackers to develop malicious software (malware) to steal them. Owing to the success of deep learning on image and language recognition, researchers direct security systems to analyze and identify malware with deep learning approaches. This paper addresses the problem of analyzing and identifying complex and unstructured malware behaviors by proposing a framework of combining unsupervised and supervised learning algorithms with a novel sequence-aware encoding method. Particularly, we adopt a hybrid GHSOM (the Growing Hierarchical Self-Organizing Map) algorithm to cluster and encode similar malware behavior sequences from system call sequences to clustering feature vectors. Then, a Recurrent Neural Network (RNN) is trained to detect malware and predict their corresponding malware families based on the sequence of the behavior vectors. Our experiments show that the accuracy rate can be up to 0.98 in malware detection and 0.719 in malware classification of an 18-category malware dataset.
Kuo, Wen-Han, und 郭文翰. „Artificial Intelligence Technology for Malware Family Detection“. Thesis, 2019. http://ndltd.ncl.edu.tw/handle/3q8ee3.
Der volle Inhalt der Quelle國立臺灣科技大學
電機工程系
107
The rapid development of Internet of Things (IoT) devices and communication technologies have greatly expanded the application of the internet. In response to people’s pursuit of high quality of life, the number of IoT devices and related services have increased annually. However, the importance of information security has been overlooked by majority of people, promoting hackers and those with ulterior motives to use malware to attack security holes in Internet applications. With the number of attack incidents increasing, detection system of malware has become imperative. This study proposed an integrative system framework that combines machine learning, deep learning, data balancing, and feature evaluation mechanism to detect malware, and a family-based approach was used to present classification results. The proposed framework can serve as a reference for antivirus companies and related service providers to develop adequate strategies for defending against malware attacks. This study acquired data from the CTU-13 open dataset, which was compiled through capturing the traffic from the network of a university. The dataset includes normal, malware, and background traffic. In order to reduce the noise in the dataset and improve the overall model efficiency, this study performed data analysis using feature evaluation methods including ANOVA, Chi-Square and AutoEncoder. Features that reduce the model accuracy were removed to reduce the model computation time and improve model stability. Because imbalanced data existed among various classes of malware and benign software in the original dataset, a data balancing mechanism was introduced to resolve this problem. The SMOTEENN algorithm was used to generate data for minority classes, thereby alleviating model deviations and enhancing the overall model credibility. This study also considered that malware receives updates and grows in number over time. Therefore, the neural networks architecture adopted in this study employ an activation function mechanism to detect malware. When an unknown malware program be found that does not belong to any family derived from the previous neural networks architecture, this mechanism incorporates the program in the model training for the subsequent model update. Analysis on the efficiency of the proposed framework revealed that the detection models with XGBoost and Back Propagation reached an accuracy rate of 99.98% and 98.88%, respectively.
Zhou, Jun-Da, und 周俊達. „DMFF: Detection Malware by its Family Features“. Thesis, 2016. http://ndltd.ncl.edu.tw/handle/53626941465322630802.
Der volle Inhalt der Quelle國立交通大學
電機工程學系
104
The population of mobile users grows rapidly and people get used to storing information on a mobile device, hence the possibility under attack raises. Among the mobile attacks, malware is the most common attack and cause large damage for mobile users. For example, A victim may suffer from the information leakage or money lost causing by Short Message Service (SMS) attacks. To improve the security of a mobile device, experts have proposed many methods for malware detection. The website, Datasets, defines four malware families to simplify the detection of malware. In this thesis, we design DMFF (Detecting Malware by its Family Features) to provide an automation tool for categorizing them. DMFF comprises four stages, \textit{Extracting Stage}, \textit{Training Stage}, \textit{Testing Stage} and \textit{Update \& Retraining}. \textit{Extracting Stage} extracts Permission and Service from an application configuration file. \textit{Training Stage} applies matrix computation to generate system training model \textbf{k} for each malware family. The value \textbf{k} is used to detect a malware in DMFF to indicate its malicious behavior. The result then are forwarded to update the system model. To evaluate DMFF, four experiments with 179 malware and 200 normal samples involving are designed to test the accuracy on applying only Permission, only Service and the combination of both Permission and Service. The last experiment tests the accuracy on distinguishing benign application from malware. With 97.42\% accuracy on distinguishing benign application from malware and 82\% accuracy on categorizing malwares, DMFF is proved its ability to detect a malware and categorize the malware by its behavior.
Chiang, Li-Yuan, und 姜立垣. „Malware Family Motif API Sequence Analysis on Windows Platform“. Thesis, 2016. http://ndltd.ncl.edu.tw/handle/71906851778430095106.
Der volle Inhalt der Quelle國立臺灣大學
資訊管理學研究所
104
This thesis aims to focus on malware on Windows platform, extracting common characteristic behaviors in a malware family, identifying differentiated characteristic behavior among malware family variants. First, we define a malware process execution to be a Windows API call sequence and winnow parameters in these sequences. Then, in order to compare these sequences, we apply sequence alignment techniques to align similar parts in execution sequences, insert gaps or align mismatch parts in different parts. Thus, we develop a system for multiple sequence alignment based on Needleman-Wunsch algorithm. This system produces a data structure, stageMatrix, to describe all segment alignment information among a family variants. Next, we extract common execution stages. We define APIs that may cause system state changes (StateChange_API, SC_API) and track the resources these APIs access and visualize the full access flow. At last, we plan to extend characteristic comparison to multiple families in future work.
Chao, Wei-Chieh, und 趙偉傑. „Base on RFpS of Ensemble learning in Malware Family Classification“. Thesis, 2017. http://ndltd.ncl.edu.tw/handle/4pavv7.
Der volle Inhalt der Quelle淡江大學
資訊管理學系碩士在職專班
105
As we know some fundamental issues of data mining applications are much more critical and severe once it refers to malware analysis, and unfortunately, they are still not well-addressed. In this paper, the proposed a function, as well as uses supervised feature projection for redundant feature reduction and noise filtering. Combining Random Forest with SVM for named RFPS (Random Forest Predicated Svm), Method of reducing feature and fast classification. The results that the learning time about 4.5 times compared with the SVM , predicted speed increases by about 2.5 times ,and the accuracy is about 20% to 98.4%.
Chiu, Wei-Jhih, und 邱偉志. „Automated Malware Family Signature Generation based on Runtime API Call Sequence“. Thesis, 2018. http://ndltd.ncl.edu.tw/handle/etw684.
Der volle Inhalt der Quelle國立臺灣大學
資訊管理學研究所
106
Recent years, the threats from malware are increasing in the world. It is important if we analyze the malwares and extract their signatures. The malware threat detection and defense will benefit from that.This research collected the malware family labels from anti-virus vendors and analyzed the behavior intents of malware family. We designed a API Call Sequence-based clustering algorithm – RasMMA, which could extract the common signature of a group of malwares. If we input some malware profiles, RasMMA algorithm could cluster the malware samples and output the common behavior of each cluster. The cluster common behavior is semantic-based which human experts could analyze the intent that malwares done. We could see the common behavior as the signature of malware family. Besides, we also found that malware family is pluralistic. The behavior clusters might different to each other in one family. Even though some clusters are cross-family clusters which behavior is similar to other families’ behavior.In the research, we also apply the behavior cluster to family sample detection. We found that our method had a better performance than other traditional data mining method in the time series malware data classification.
Chen, Ting-Yi, und 陳廷易. „Malware Family Classification System based on Attention-based Characteristic Execution Sequence“. Thesis, 2019. http://ndltd.ncl.edu.tw/handle/6jj2mm.
Der volle Inhalt der Quelle國立臺灣大學
資訊管理學研究所
107
In recent years, the number of malicious software (malware) has increased rapidly, which has caused a lot of losses for individuals and businesses around the world. Understanding the intention of malware and extracting key execution behaviors will considerably help detect and defend against malware. This research proposes an automated important execution sequence behavior identification system. The recurrent neural network and self-attention mechanism are used as the basis of the architecture. It is used to analyze Windows API call invocations sequence recording at runtime, and capture the relationship between API call invocations. To automatically identify malware whether each API call invocation is a characteristic API call in malicious behavioral activity, and can respond to its malicious intentions. The proposed system contains three functional modules, namely Embedder which vectorizes API call invocations, Encoder which calculates the importance of each API call invocation in the execution profiles, and Filter which extracts important API call invocations from the malware. Through these three modules, we can establish a pipeline for malware analysis and family classification. The important API call invocations of the system output allow the security analysts to quickly know the semantic interpretation of the characteristic execution pattern and classify or cluster malware by calculating the similarity score. Compared with other methods our experiments not only prove the effectiveness of the proposed functional modules in our system but also demonstrate the system''s behavioral feature recognition ability, which can classify unseen malware correctly into their family. Additionally, we visualize the important API call invocations of the malware and analyze the relationship between different behavioral patterns and family characteristic execution patterns. We found that the malware family is pluralistic, and the same behavioral patterns can exist in many different families.
Hsueh, Chu-Yun, und 薛筑允. „Automated Generation and Semantic Analysis of System-state-change Activity Lifecycle of Malware Family“. Thesis, 2018. http://ndltd.ncl.edu.tw/handle/5676wn.
Der volle Inhalt der Quelle國立臺灣大學
資訊管理學研究所
106
In this work, we aim to visualize the common behavior of malware family that cause system state changes. First of all, we conduct a malware classification based on proposed family classification algorithm. Secondly, we use the high-level semantics profiling system to profile different variants of malware family, generating the time-ordered sequences of each variant, called execution traces. Then, in order to differentiate behavior diversity between different variants in same malware family, we input execution trace of each variant to Runtime API call sequence-based motif mining algorithm to conduct behavior sequence clustering, producing behavior forest of a malware family. For each behavior tree in behavior forest, we collect execution trace belong to behavior tree and input to Global Sequence Alignment module to gather longest alignment result. For each behavior tree in behavior forest, we input all execution traces belong to the behavior tree to Global Sequence Alignment module to acquire longest alignment combination. Finally, we obtain the 100% common behavior sequence from GSA result, then extract sequence that will causing system state change from 100% common behavior sequence, visualize the behavior using trajectory graph, called system-state-change resource manipulation trajectory We also make semantic explanation toward produced trajectory graph, expound malicious intent of malware family, provide in-depth and clear malicious activity illustration, and verify behavior of malware family with illustration of antivirus software company.
Buchteile zum Thema "Malware family"
Basole, Samanvitha, und Mark Stamp. „Cluster Analysis of Malware Family Relationships“. In Malware Analysis Using Artificial Intelligence and Deep Learning, 361–79. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62582-5_14.
Der volle Inhalt der QuelleAman, Naqqash, Yasir Saleem, Fahim H. Abbasi und Farrukh Shahzad. „A Hybrid Approach for Malware Family Classification“. In Applications and Techniques in Information Security, 169–80. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-5421-1_14.
Der volle Inhalt der QuelleIslam, Rafiqul, und Irfan Altas. „A Comparative Study of Malware Family Classification“. In Information and Communications Security, 488–96. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34129-8_48.
Der volle Inhalt der QuelleShrestha, Prasha, Suraj Maharjan, Gabriela Ramírez de la Rosa, Alan Sprague, Thamar Solorio und Gary Warner. „Using String Information for Malware Family Identification“. In Advances in Artificial Intelligence -- IBERAMIA 2014, 686–97. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12027-0_55.
Der volle Inhalt der QuelleChoudhary, Chhaya, Raaghavi Sivaguru, Mayana Pereira, Bin Yu, Anderson C. Nascimento und Martine De Cock. „Algorithmically Generated Domain Detection and Malware Family Classification“. In Communications in Computer and Information Science, 640–55. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-5826-5_50.
Der volle Inhalt der QuelleGayathri, T., und M. S. Vijaya. „Malware Family Classification Model Using Convolutional Neural Network“. In Advances in Intelligent Systems and Computing, 27–35. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-0171-2_3.
Der volle Inhalt der QuelleDavis, Shreya, C. N. Sminesh, K. S. Akshay, T. R. Akshay und Anjali Ranjith. „An Evaluation of Convolutional Neural Networks for Malware Family Classification“. In Communications in Computer and Information Science, 51–60. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-9700-8_5.
Der volle Inhalt der QuelleChen, Yihang, Fudong Liu, Zheng Shan und Guanghui Liang. „MalCommunity: A Graph-Based Evaluation Model for Malware Family Clustering“. In Communications in Computer and Information Science, 279–97. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-2203-7_21.
Der volle Inhalt der QuelleSun, Yeali S., Chien-Chun Chen, Shun-Wen Hsiao und Meng Chang Chen. „ANTSdroid: Automatic Malware Family Behaviour Generation and Analysis for Android Apps“. In Information Security and Privacy, 796–804. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93638-3_48.
Der volle Inhalt der QuelleGayathri, T., und M. S. Vijaya. „Malware Family Classification Model Using User Defined Features and Representation Learning“. In IFIP Advances in Information and Communication Technology, 185–95. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-63467-4_14.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Malware family"
Kumar, Nitish, und Toshanlal Meenpal. „Texture-Based Malware Family Classification“. In 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT). IEEE, 2019. http://dx.doi.org/10.1109/icccnt45670.2019.8944659.
Der volle Inhalt der QuelleHsiao, Shun-Wen, Yeali S. Sun und Meng Chang Chen. „Behavior grouping of Android malware family“. In ICC 2016 - 2016 IEEE International Conference on Communications. IEEE, 2016. http://dx.doi.org/10.1109/icc.2016.7511424.
Der volle Inhalt der QuellePitolli, Gregorio, Leonardo Aniello, Giuseppe Laurenza, Leonardo Querzoni und Roberto Baldoni. „Malware family identification with BIRCH clustering“. In 2017 International Carnahan Conference on Security Technology (ICCST). IEEE, 2017. http://dx.doi.org/10.1109/ccst.2017.8167802.
Der volle Inhalt der QuelleTurker, Sercan, und Ahmet Burak Can. „AndMFC: Android Malware Family Classification Framework“. In 2019 IEEE 30th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC Workshops). IEEE, 2019. http://dx.doi.org/10.1109/pimrcw.2019.8880840.
Der volle Inhalt der QuelleWalker, Aaron, und Shamik Sengupta. „Malware Family Fingerprinting Through Behavioral Analysis“. In 2020 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 2020. http://dx.doi.org/10.1109/isi49825.2020.9280529.
Der volle Inhalt der QuelleXie, Qi, Yongjun Wang und Zhiquan Qin. „Malware Family Classification using LSTM with Attention“. In 2020 13th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI). IEEE, 2020. http://dx.doi.org/10.1109/cisp-bmei51763.2020.9263499.
Der volle Inhalt der QuelleNomura, Kazuya, Daiki Chiba, Mitsuaki Akiyama und Masato Uchida. „Auto-creation of Android Malware Family Tree“. In ICC 2021 - IEEE International Conference on Communications. IEEE, 2021. http://dx.doi.org/10.1109/icc42927.2021.9500876.
Der volle Inhalt der QuelleChang, Shun-Chieh, Yeali S. Sun, Wu-Long Chuang, Meng-Chang Chen, Bo Sun und Takeshi Takahashi. „ANTSdroid: Using RasMMA Algorithm to Generate Malware Behavior Characteristics of Android Malware Family“. In 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, 2018. http://dx.doi.org/10.1109/prdc.2018.00047.
Der volle Inhalt der QuelleBoukhtouta, Amine, Nour-Eddine Lakhdari und Mourad Debbabi. „Inferring Malware Family through Application Protocol Sequences Signature“. In 2014 6th International Conference on New Technologies, Mobility and Security (NTMS). IEEE, 2014. http://dx.doi.org/10.1109/ntms.2014.6814026.
Der volle Inhalt der QuelleChen, Chin-Wei, Ching-Hung Su, Kun-Wei Lee und Ping-Hao Bair. „Malware Family Classification using Active Learning by Learning“. In 2020 22nd International Conference on Advanced Communication Technology (ICACT). IEEE, 2020. http://dx.doi.org/10.23919/icact48636.2020.9061419.
Der volle Inhalt der Quelle