2012
DOI: 10.4304/jnw.7.6.946-955
|View full text |Cite
|
Sign up to set email alerts
|

A Comparison of the Classification of Disparate Malware Collected in Different Time Periods

Abstract:

It has been argued that an anti-virus strategy based on malware collected at a certain date, will not work at a later date because malware evolves rapidly and an anti-virus engine is then faced with a completely new type of executable not as amenable to detection as the first was.

In this paper, we test this idea by collecting two sets of malware, the first from 2002 to 2007, the second from 2009 to 2010 to determine how well the anti-virus strategy we develop… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2013
2013
2016
2016

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…In [24] the authors compare two disparate sets of malware collected in different time periods and train an antivirus strategy on the earlier set to determine how well it will manage to handle the later set. An anti-virus strategy is used that integrates dynamic and static features extracted from the executables to to detect malware versus cleanware and to classify malware by distinguishing between malware families.…”
Section: Related Workmentioning
confidence: 99%
“…In [24] the authors compare two disparate sets of malware collected in different time periods and train an antivirus strategy on the earlier set to determine how well it will manage to handle the later set. An anti-virus strategy is used that integrates dynamic and static features extracted from the executables to to detect malware versus cleanware and to classify malware by distinguishing between malware families.…”
Section: Related Workmentioning
confidence: 99%
“…Our MHS has more layers and tackles the new problem of filtering phishing emails during a new time span utilizing only the training data of a separate previous time span. This is inspired by the previous work in the different area of malware detection, where analogous task was investigated in . In the case of phishing email, this problem can be regarded as an advanced special case of zero‐day phishing email filtering.…”
Section: Introductionmentioning
confidence: 99%