DOI: 10.1007/978-3-540-74320-0_10
|View full text |Cite
|
Sign up to set email alerts
|

Automated Classification and Analysis of Internet Malware

Abstract: Numerous attacks, such as worms, phishing, and botnets, threaten the availability of the Internet, the integrity of its hosts, and the privacy of its users. A core element of defense against these attacks is anti-virus (AV) software-a service that detects, removes, and characterizes these threats. The ability of these products to successfully characterize these threats has far-reaching effects-from facilitating sharing across organizations, to detecting the emergence of new threats, and assessing risk in quara… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

3
326
0
1

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 377 publications
(330 citation statements)
references
References 16 publications
3
326
0
1
Order By: Relevance
“…The accuracy of the clustering result of [30] is influenced by the parameter of the tree-cutting algorithm, and [31] is influenced by the kind of the family set used to learn. However, our classification method can decide the number of clusters automatically without pre-learning process of a malware familly.…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…The accuracy of the clustering result of [30] is influenced by the parameter of the tree-cutting algorithm, and [31] is influenced by the kind of the family set used to learn. However, our classification method can decide the number of clusters automatically without pre-learning process of a malware familly.…”
Section: Resultsmentioning
confidence: 99%
“…Bailey et al proposed a new malware classification scheme that calculates distance between malware samples based on profiles of malware samples derived by "Normalized Compression Distance (NCD)" [30]. Then it used pairwise single-linkage clustering, which defines the distane between two clusters as the minimum distance between any two members of the clusters.…”
Section: Malware Classificationmentioning
confidence: 99%
See 2 more Smart Citations
“…To this end, various data mining and machine learning approaches [21,28,14,19,25,5,6,18,27,9,20] have been applied to categorize malware into families based on different features derived from the analysis of the malware. Indeed, malware analysis involves two fundamental techniques: static and dynamic.…”
Section: Related Workmentioning
confidence: 99%