Fractal Methods for the Representation and Analysis of Polymorphism in Malware Fractal Methods for the Representation and Analysis of Polymorphism in Malware

被引:0
|
作者
Cowen, Benn [1 ]
Shafi, Kamran [2 ]
机构
[1] Dept Def, Canberra, ACT, Australia
[2] Univ New S Wales, Sch Engn & IT, Canberra, ACT, Australia
关键词
Computer security; Fractals; Intrusion detection; Random processes; Visualization;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The preponderance of network resident cyber threats are due to zero day vulnerabilities or unpatched systems. Traditional signature based detection methods are ineffective against such threats, and anomaly detection methods are typically computationally intensive. By treating polymorphism as a stochastic process and applying fractal visualization methods, identifying features can be found. These features are suited to then be used for detection with algorithms such as Bayes classifiers.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] The impact of malware evolution on the analysis methods and infrastructure
    Cabaj, Krzysztof
    Gawkowski, Piotr
    Grochowski, Konrad
    Nowikowski, Alexis
    Zorawski, Piotr
    PROCEEDINGS OF THE 2017 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2017, : 549 - 553
  • [2] ANALYSIS OF MACHINE LEARNING METHODS ON MALWARE DETECTION
    Aydogan, Emre
    Sen, Sevil
    2014 22ND SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2014, : 2066 - 2069
  • [3] Methods for automatic malware analysis and classification: a survey
    Grzinic, Toni
    Gonzalez, Eduardo Blazquez
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2022, 17 (1-2) : 179 - 203
  • [4] Evaluations and Analysis of Malware Prevention Methods on Websites
    Yagi, Takeshi
    Murayama, Junichi
    Hariu, Takeo
    Ohsaki, Hiroyuki
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2013, E96B (12) : 3091 - 3100
  • [5] A comparative study of various existing malware analysis methods
    Dahiya N.
    Mahajan S.
    International Journal of Networking and Virtual Organisations, 2019, 21 (02) : 268 - 276
  • [6] Comparative Analysis of Word Vectoring Methods for Malware Detection
    Gunduz, Ayse Bilge
    Yavuz, Ali Gokhan
    29TH IEEE CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS (SIU 2021), 2021,
  • [7] Investigation of Feature Selection Methods for Android Malware Analysis
    Deepa, K.
    Radhamani, G.
    Vinod, P.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, ICICT 2014, 2015, 46 : 841 - 848
  • [8] Formal Methods for Android Banking Malware Analysis and Detection
    Iadarola, Giacomo
    Martinelli, Fabio
    Mercaldo, Francesco
    Santone, Antonella
    2019 SIXTH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS: SYSTEMS, MANAGEMENT AND SECURITY (IOTSMS), 2019, : 331 - 336
  • [9] FRACTAL GRAPHICAL REPRESENTATION AND ANALYSIS OF DNA AND PROTEIN SEQUENCES
    SOLOVYEV, VV
    BIOSYSTEMS, 1993, 30 (1-3) : 137 - 160
  • [10] Malware Classification Using Image Representation
    Singh, Ajay
    Handa, Anand
    Kumar, Nitesh
    Shukla, Sandeep Kumar
    CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING, CSCML 2019, 2019, 11527 : 75 - 92