2015
DOI: 10.1016/j.jss.2014.10.031
|View full text |Cite
|
Sign up to set email alerts
|

Profiling and classifying the behavior of malicious codes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
57
0
1

Year Published

2015
2015
2022
2022

Publication Types

Select...
3
3
3

Relationship

4
5

Authors

Journals

citations
Cited by 133 publications
(58 citation statements)
references
References 10 publications
0
57
0
1
Order By: Relevance
“…There is an urgent need to identify new malware-embedded spam attacks (especially in the increasingly common URL approach) without the need to wait for updates from spam scanners or blacklists (Tran et al 2013). Machine-learning methods of identifying spam and other spam-filtering methods aim to be highly responsive to changes in spamming techniques, but have not been sufficiently flexible to handle variations in the content or delivery methods found in spam emails (Blanzieri and Bryl 2008;Alazab 2015).…”
Section: Discussionmentioning
confidence: 99%
“…There is an urgent need to identify new malware-embedded spam attacks (especially in the increasingly common URL approach) without the need to wait for updates from spam scanners or blacklists (Tran et al 2013). Machine-learning methods of identifying spam and other spam-filtering methods aim to be highly responsive to changes in spamming techniques, but have not been sufficiently flexible to handle variations in the content or delivery methods found in spam emails (Blanzieri and Bryl 2008;Alazab 2015).…”
Section: Discussionmentioning
confidence: 99%
“…Other than the implementations mentioned above, the BDs of time series (e.g., time-series databases) are required to be associated with an encrypted timestamp, the authors in [46] proposed an access and inference control model to enforce time and value-based constraints over the hierarchical time series data. Meanwhile, the analyzing of malicious codes and intrusion detection for cybersecurity and malware detection was reported [47,48,49,50] Standardizing the security development schema of secure systems was first reported in [51]. This standardization unifies practices and languages for modelling security and access control among different implementers.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, we have studied how to apply machine learning for automatic JavaScript identification. Huda et al [16] proposed a framework for malware detection by choosing application program interface call statistics as malware features and using the SVM as the classifier; similarly, Alazab [17] extracted features from the sequences of application program interface calls and employed the k-nearest neighbor algorithm to classify malware behaviors; AL-Taharwa et al [18] provided a JavaScript obfuscation detector, which is a mining and machine learning approach to detect obfuscated codes; Soska and Christin [19] constructed a set of features from the aspects of traffic statistics, file system structure, and webpage contents, which is followed by the process of adopting a C4.5 decision tree algorithm to determine the maliciousness of a target website. Although these traditional machine learning-based methods can predict unknown new malicious JavaScript code, the consumption of testing time would potentially affect their efficiency.…”
Section: Related Workmentioning
confidence: 99%