Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining 2011
DOI: 10.1145/2020408.2020448
|View full text |Cite
|
Sign up to set email alerts
|

Combining file content and file relations for cloud based malware detection

Abstract: Due to their damages to Internet security, malware (such as virus, worms, trojans, spyware, backdoors, and rootkits) detection has caught the attention not only of anti-malware industry but also of researchers for decades. Resting on the analysis of file contents extracted from the file samples, like Application Programming Interface (API) calls, instruction sequences, and binary strings, data mining methods such as Naive Bayes and Support Vector Machines have been used for malware detection. However, besides … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
54
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 74 publications
(54 citation statements)
references
References 25 publications
0
54
0
Order By: Relevance
“…The anti-malware software widely uses the signature-based method to identify the known threats/malware. A signature is a short sequence of bytes that uniquely characterizes any malware [5]. The signatures are created manually by an analyst by analyzing the malware.…”
Section: Signature-based Detectionmentioning
confidence: 99%
See 2 more Smart Citations
“…The anti-malware software widely uses the signature-based method to identify the known threats/malware. A signature is a short sequence of bytes that uniquely characterizes any malware [5]. The signatures are created manually by an analyst by analyzing the malware.…”
Section: Signature-based Detectionmentioning
confidence: 99%
“…Comodo's Anti-Virus products [5,26,27] and Symantec Anti-Malware products [28]. These methods have better results but still fail to avoid false alarms on one hand and fail to detect novel malware on the other hand.…”
Section: Data Analysis-based Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Due to Internet propagation malware has been rapidly spreading and infecting computers around the world at an unprecedented rate [1] and malware detection became one of the top internet security topics [2,11,3]. Security software developers reported that the release rate of malicious code and other unwanted programs may be exceeding that of legitimate software applications [11].…”
Section: Introductionmentioning
confidence: 99%
“…Web services enable the identification of malware with a huge partners data about viruses collected, e.g. virustotal.com 1 . But even a huge malware database does not guarantee detection of new ones.…”
Section: Introductionmentioning
confidence: 99%