Detection of Malicious Executable Files Based on Clustering of Activities

被引:0
|
作者
R. A. Ognev
E. V. Zhukovskii
D. P. Zegzhda
机构
[1] Peter the Great St. Petersburg Polytechnic University,
关键词
classification; clustering; malware; malicious behavior; machine learning; behavioral analysis; dynamic analysis; computer security;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:1092 / 1098
页数:6
相关论文
共 50 条
  • [41] Detection of Malicious Executables Using Static and Dynamic Features of Portable Executable (PE) File
    Awan, Saba
    Saqib, Nazar Abbas
    [J]. SECURITY, PRIVACY AND ANONYMITY IN COMPUTATION, COMMUNICATION AND STORAGE, (SPACCS 2016), 2016, 0067 : 48 - 58
  • [42] A Image Texture and BP neural network based Malicious Files Detection Technique for Cloud Storage Systems
    Wen, Guanchao
    Hu, Yupeng
    Jiang, Chen
    Cao, Na
    Qin, Zheng
    [J]. 2017 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2017, : 426 - 431
  • [43] Data Mining Based Strategy for Detecting Malicious PDF Files
    Sayed, Samir G.
    Shawkey, Mohamed
    [J]. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 661 - 667
  • [44] Malicious virtual machines detection through a clustering approach
    Bazm, Mohammad
    Khatoun, Rida
    Begriche, Youcef
    Khoukhi, Lyes
    Chen, Xiuzhen
    Serhrouchni, Ahmed
    [J]. 2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15), 2015, : 193 - 200
  • [45] Identification of Executable Files on the basis of Statistical Criteria
    Krivtsova, Irina E.
    Lebedev, Ilya S.
    Salakhutdinova, Kseniya I.
    [J]. PROCEEDINGS OF THE 20TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT 2017), 2017, : 202 - 208
  • [46] REWRITING EXECUTABLE FILES TO MEASURE PROGRAM BEHAVIOR
    LARUS, JR
    BALL, T
    [J]. SOFTWARE-PRACTICE & EXPERIENCE, 1994, 24 (02): : 197 - 218
  • [47] A PSO based malicious node detection and energy efficient clustering in wireless sensor network
    Kumar, Sumit
    Mehfuz, Shabana
    [J]. 2019 6TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN), 2019, : 859 - 863
  • [48] K-Means Clustering Analysis Based on Adaptive Weights for Malicious Code Detection
    Sun Haoliang
    Wang Dawei
    Zhang Ying
    [J]. 2019 IEEE 11TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN 2019), 2019, : 652 - 656
  • [49] Robust Federated Learning Based on Metrics Learning and Unsupervised Clustering for Malicious Data Detection
    Li, Jiaming
    Zhang, Xinyue
    Zhao, Liang
    [J]. ACMSE 2022: PROCEEDINGS OF THE 2022 ACM SOUTHEAST CONFERENCE, 2022, : 238 - 242
  • [50] Detection of malicious PDF files and directions for enhancements: A state-of-the art survey
    Nissim, Nir
    Cohen, Aviad
    Glezer, Chanan
    Elovici, Yuval
    [J]. COMPUTERS & SECURITY, 2015, 48 : 246 - 266