Fractal Methods for the Representation and Analysis of Polymorphism in Malware Fractal Methods for the Representation and Analysis of Polymorphism in Malware

被引:0
|
作者
Cowen, Benn [1 ]
Shafi, Kamran [2 ]
机构
[1] Dept Def, Canberra, ACT, Australia
[2] Univ New S Wales, Sch Engn & IT, Canberra, ACT, Australia
关键词
Computer security; Fractals; Intrusion detection; Random processes; Visualization;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The preponderance of network resident cyber threats are due to zero day vulnerabilities or unpatched systems. Traditional signature based detection methods are ineffective against such threats, and anomaly detection methods are typically computationally intensive. By treating polymorphism as a stochastic process and applying fractal visualization methods, identifying features can be found. These features are suited to then be used for detection with algorithms such as Bayes classifiers.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] DPDB:: a database for the storage, representation and analysis of polymorphism in the Drosophila genus
    Casillas, S
    Petit, N
    Barbadilla, A
    BIOINFORMATICS, 2005, 21 : 26 - 30
  • [42] From malware samples to fractal images: A new paradigm for classification
    Zelinka, Ivan
    Szczypka, Miloslav
    Plucar, Jan
    Kuznetsov, Nikolay
    MATHEMATICS AND COMPUTERS IN SIMULATION, 2024, 218 (174-203) : 174 - 203
  • [43] The rise of "malware": Bibliometric analysis of malware study
    Ab Razak, Mohd Faizal
    Anuar, Nor Badrul
    Salleh, Rosli
    Firdaus, Ahmad
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 75 : 58 - 76
  • [44] Segmented Sandboxing - A Novel Approach to Malware Polymorphism Detection
    Osorio, Fernando C. Colon
    Qiu, Hongyuan
    Arrott, Anthony
    2015 10TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE), 2015, : 59 - 68
  • [45] An explicit norm representation for the analysis of multilevel methods
    Gero Nießen
    Advances in Computational Mathematics, 1998, 9 : 311 - 335
  • [46] Collaborative representation analysis methods for feature extraction
    Hua, Juliang
    Wang, Huan
    Ren, Mingu
    Huang, Heyan
    NEURAL COMPUTING & APPLICATIONS, 2017, 28 : S225 - S231
  • [47] An explicit norm representation for the analysis of multilevel methods
    Niessen, G
    ADVANCES IN COMPUTATIONAL MATHEMATICS, 1998, 9 (3-4) : 311 - 335
  • [48] Collaborative representation analysis methods for feature extraction
    Juliang Hua
    Huan Wang
    Mingu Ren
    Heyan Huang
    Neural Computing and Applications, 2017, 28 : 225 - 231
  • [49] Android Malware Detection via Graph Representation Learning
    Feng, Pengbin
    Ma, Jianfeng
    Li, Teng
    Ma, Xindi
    Xi, Ning
    Lu, Di
    MOBILE INFORMATION SYSTEMS, 2021, 2021
  • [50] Learning Dynamic Malware Representation From Common Behavior
    Huang, Yi-Ting
    Chen, Ting-Yi
    Hsiao, Shun-Wen
    Sun, Yeali S.
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2022, 38 (06) : 1317 - 1334