Malware Collection and Analysis

被引:11
|
作者
Paranthaman, Ramkumar [1 ]
Thuraisingham, Bhavani [1 ]
机构
[1] Univ Texas Dallas, Dept Comp Sci, Richardson, TX 75083 USA
基金
美国国家科学基金会;
关键词
Malware Collection; Malware Analysis; Big Data;
D O I
10.1109/IRI.2017.92
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes the various malware datasets that we have obtained permissions to host at the University of Arizona as part of a National Science Foundation funded project. It also describes some other malware datasets that we are in the process of obtaining permissions to host at the University of Arizona. We have also discussed some preliminary work we have carried out on malware analysis using big data platforms.
引用
收藏
页码:26 / 31
页数:6
相关论文
共 50 条
  • [1] An Open Architecture for Distributed Malware Collection and Analysis
    Cavalca, Davide
    Goldoni, Emanuele
    OPEN SOURCE SOFTWARE FOR DIGITAL FORENSICS, 2010, : 101 - +
  • [2] A Malware Collection and Analysis Framework Based on Darknet Traffic
    Song, Jungsuk
    Choi, Jang-Won
    Choi, Sang-Soo
    NEURAL INFORMATION PROCESSING, ICONIP 2012, PT II, 2012, 7664 : 624 - 631
  • [3] Automated Collection and Analysis of Malware Disseminated via Online Advertising
    Sakib, Muhammad N.
    Huang, Chin-Tser
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 1411 - 1416
  • [4] Design and Prototyping of Framework for Automated Continuous Malware Collection and Analysis
    Takeda, Keiji
    Mizutani, Masayoshi
    2011 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2011,
  • [5] Active versus Passive Malware Collection
    Lin, Ying-Dar
    Lee, Chia-Yin
    Wu, Yu-Sung
    Ho, Pei-Hsiu
    Wang, Fu-Yu
    Tsai, Yi-Lang
    COMPUTER, 2014, 47 (04) : 59 - 65
  • [6] McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables
    Perdisci, Roberto
    Lanzi, Andrea
    Lee, Wenke
    24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2008, : 301 - +
  • [7] A proactive approach to intrusion detection and malware collection
    Chen, Chia-Mei
    Cheng, Sheng-Tzong
    Zeng, Ruei-Yu
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (07) : 844 - 853
  • [8] Proactive malware collection and classification system: How to collect and classify useful malware samples?
    Tseng, Chinyang Henry
    Wang, Shiahuey
    Wang, Sheng-Chao
    Juang, Tong-Ying
    Proceedings - 2014 International Conference on Information Science, Electronics and Electrical Engineering, ISEEE 2014, 2014, 3 : 1846 - 1849
  • [9] Proactive Malware Collection and Classification System: How to collect and classify useful malware samples?
    Tseng, Chinyang Henry
    Wang, Shiahuey
    Wang, Sheng-Chao
    Juang, Tong-Ying
    2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE, ELECTRONICS AND ELECTRICAL ENGINEERING (ISEEE), VOLS 1-3, 2014, : 1845 - 1848
  • [10] The rise of "malware": Bibliometric analysis of malware study
    Ab Razak, Mohd Faizal
    Anuar, Nor Badrul
    Salleh, Rosli
    Firdaus, Ahmad
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 75 : 58 - 76