CORC  > 兰州大学  > 兰州大学  > 学院待认领  > 会议论文
Mining distinguishing patterns based on malware traces
Sun, Xiaoyan; Huang, Qian; Zhu, Yuefei; Guo, Ning; Sun, X.
2010
会议日期July 9, 2010 - July 11, 2010
会议地点Chengdu, China
关键词Data Mining Computer Crime Computer Science Information Technology Mining Distinguishing Pattern Malicious Behavior Mutual Informations Subgraph Mining System Calls
卷号2
DOI10.1109/ICCSIT.2010.5565105
页码677-681
英文摘要The automatic generation of malicious behavior pattern based on system call trace is important to malware detection. This paper studied the existing generation method of malicious behavior specification. In order to reduce the complexity of pattern generation, it constructs graph which vertex label is unique, and uses these graphs to mine the pattern. To address the issue of limitation of the minimal contrast subgraph mining method, it uses multiple positive and negative samples, and proposes a mining method to mine distinguishing patterns based on mutual information. It designs the overall framework of mining process, and gives the mining algorithm. Finally, validation results demonstrate the effectiveness. © 2010 IEEE.
会议录Proceedings - 2010 3rd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2010
会议录出版地Piscataway
学科主题Mine And Quarry Operations ; Computer Circuits And Logic Elements ; Computer Systems And Equipment ; Computer Software, Data HAndling And Applications ; Information Science
语种英语
内容类型会议论文
源URL[http://ir.lzu.edu.cn/handle/262010/182869]  
专题学院待认领_会议论文
通讯作者Sun, X.
推荐引用方式
GB/T 7714
Sun, Xiaoyan,Huang, Qian,Zhu, Yuefei,et al. Mining distinguishing patterns based on malware traces[C]. 见:. Chengdu, China. July 9, 2010 - July 11, 2010.
个性服务
查看访问统计
相关权益政策
暂无数据
收藏/分享
所有评论 (0)
暂无评论
 

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。


©版权所有 ©2017 CSpace - Powered by CSpace